nmap

Descobrindo status das principais portas

# COMMAND
nmap -Pn -F {host}

# Output Sample
Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower.
Starting Nmap 7.91 ( https://nmap.org ) at 2021-04-06 15:35 EDT
Nmap scan report for scanme.nmap.com (45.33.32.156)
Host is up (0.23s latency).
Other addresses for scanme.nmap.com (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f
rDNS record for 45.33.32.156: scanme.nmap.org
Not shown: 94 closed ports
PORT    STATE    SERVICE
22/tcp  open     ssh
25/tcp  filtered smtp
80/tcp  open     http
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds

Nmap done: 1 IP address (1 host up) scanned in 8.47 seconds
  • {host}: domain ou ip

  • -F: principais portas

  • -Pn: não executar ping no mapeamento

Fingerprint de serviços e SO

  • -A: Enable OS detection, version detection, script scanning, and traceroute.

Descobrir hosts ativos na rede

  • -sP: This option tells Nmap not to do a port scan after host discovery, and only print out the available hosts that responded to the scan.

PortScan com IPs randômicos

  • -D RND:20 : Decoy, vai realizar o ataque simulando 20 endereços IPs randômicos.

Last updated

Was this helpful?