From 785d46be26458bbfc5a820fdf2f143792bd7f4a4 Mon Sep 17 00:00:00 2001 From: Fazle Arefin Date: Mon, 4 Mar 2024 04:05:44 +1100 Subject: [PATCH] nmap: edit page (#12450) * Fix description of example which is to evade detection rather than getting detected * Add missing comma before ellipsis --------- Co-authored-by: Lena <126529524+acuteenvy@users.noreply.github.com> --- pages/common/nmap.md | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/pages/common/nmap.md b/pages/common/nmap.md index ea22c1e34..63f32d85a 100644 --- a/pages/common/nmap.md +++ b/pages/common/nmap.md @@ -10,28 +10,28 @@ - Run a ping sweep over an entire subnet or individual hosts very aggressively: -`nmap -T5 -sn {{192.168.0.0/24|ip_or_hostname1,ip_or_hostname2...}}` +`nmap -T5 -sn {{192.168.0.0/24|ip_or_hostname1,ip_or_hostname2,...}}` - Enable OS detection, version detection, script scanning, and traceroute: -`sudo nmap -A {{ip_or_hostname1,ip_or_hostname2...}}` +`sudo nmap -A {{ip_or_hostname1,ip_or_hostname2,...}}` - Scan a specific list of ports (use `-p-` for all ports from 1 to 65535): -`nmap -p {{port1,port2...}} {{ip_or_host1,ip_or_host2...}}` +`nmap -p {{port1,port2,...}} {{ip_or_host1,ip_or_host2,...}}` - Perform service and version detection of the top 1000 ports using default NSE scripts, writing results (`-oA`) to output files: -`nmap -sC -sV -oA {{top-1000-ports}} {{ip_or_host1,ip_or_host2...}}` +`nmap -sC -sV -oA {{top-1000-ports}} {{ip_or_host1,ip_or_host2,...}}` - Scan target(s) carefully using `default and safe` NSE scripts: -`nmap --script "default and safe" {{ip_or_host1,ip_or_host2...}}` +`nmap --script "default and safe" {{ip_or_host1,ip_or_host2,...}}` - Scan for web servers running on standard ports 80 and 443 using all available `http-*` NSE scripts: -`nmap --script "http-*" {{ip_or_host1,ip_or_host2...}} -p 80,443` +`nmap --script "http-*" {{ip_or_host1,ip_or_host2,...}} -p 80,443` -- Attempt IDS/IPS detection by using an extremely slow scan (`-T0`), decoy source addresses (`-D`), [f]ragmented packets, random data and other methods: +- Attempt evading IDS/IPS detection by using an extremely slow scan (`-T0`), decoy source addresses (`-D`), [f]ragmented packets, random data and other methods: -`sudo nmap -T0 -D {{decoy_ip1,decoy_ip2...}} --source-port {{53}} -f --data-length {{16}} -Pn {{ip_or_host}}` +`sudo nmap -T0 -D {{decoy_ip1,decoy_ip2,...}} --source-port {{53}} -f --data-length {{16}} -Pn {{ip_or_host}}`