nmap: edit page (#12450)

* Fix description of example which is to evade detection rather than getting detected
* Add missing comma before ellipsis

---------

Co-authored-by: Lena <126529524+acuteenvy@users.noreply.github.com>
pull/23/head
Fazle Arefin 2024-03-04 04:05:44 +11:00 committed by GitHub
parent e99c134ae0
commit 785d46be26
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 8 additions and 8 deletions

View File

@ -10,28 +10,28 @@
- Run a ping sweep over an entire subnet or individual hosts very aggressively:
`nmap -T5 -sn {{192.168.0.0/24|ip_or_hostname1,ip_or_hostname2...}}`
`nmap -T5 -sn {{192.168.0.0/24|ip_or_hostname1,ip_or_hostname2,...}}`
- Enable OS detection, version detection, script scanning, and traceroute:
`sudo nmap -A {{ip_or_hostname1,ip_or_hostname2...}}`
`sudo nmap -A {{ip_or_hostname1,ip_or_hostname2,...}}`
- Scan a specific list of ports (use `-p-` for all ports from 1 to 65535):
`nmap -p {{port1,port2...}} {{ip_or_host1,ip_or_host2...}}`
`nmap -p {{port1,port2,...}} {{ip_or_host1,ip_or_host2,...}}`
- Perform service and version detection of the top 1000 ports using default NSE scripts, writing results (`-oA`) to output files:
`nmap -sC -sV -oA {{top-1000-ports}} {{ip_or_host1,ip_or_host2...}}`
`nmap -sC -sV -oA {{top-1000-ports}} {{ip_or_host1,ip_or_host2,...}}`
- Scan target(s) carefully using `default and safe` NSE scripts:
`nmap --script "default and safe" {{ip_or_host1,ip_or_host2...}}`
`nmap --script "default and safe" {{ip_or_host1,ip_or_host2,...}}`
- Scan for web servers running on standard ports 80 and 443 using all available `http-*` NSE scripts:
`nmap --script "http-*" {{ip_or_host1,ip_or_host2...}} -p 80,443`
`nmap --script "http-*" {{ip_or_host1,ip_or_host2,...}} -p 80,443`
- Attempt IDS/IPS detection by using an extremely slow scan (`-T0`), decoy source addresses (`-D`), [f]ragmented packets, random data and other methods:
- Attempt evading IDS/IPS detection by using an extremely slow scan (`-T0`), decoy source addresses (`-D`), [f]ragmented packets, random data and other methods:
`sudo nmap -T0 -D {{decoy_ip1,decoy_ip2...}} --source-port {{53}} -f --data-length {{16}} -Pn {{ip_or_host}}`
`sudo nmap -T0 -D {{decoy_ip1,decoy_ip2,...}} --source-port {{53}} -f --data-length {{16}} -Pn {{ip_or_host}}`