Port Scan
Nmap
# -sS: SYN Scan
# -sV: Service/Version detection
# -sC: Default NSE (script)
# -T2: Timing template.
# -p-: Scan all ports
sudo nmap -sSVC -p- <target-ip> -T2
sudo nmap -sSVC -p 1-65535 <target-ip>
# -p 1000-1500: Scan ports from 1000 to 1500
sudo nmap -sSVC -p 1000-1500 <target-ip>
# If port scanning on CTF not real organization, use `--min-rate` for increase scan speed.
# --min-rate: Send packets no slower than <number> per second
sudo nmap -sSVC -p- <target-ip> --min-rate 1000
# -A: All detection
sudo nmap -sS -A <target-ip>UDP Scan
Skip Host Discovery
Specified Ports
Network Ranges
Scan Techniques
Firewall Bypass
Nmap Scripting Engine (NSE)
Using Proxychains
Port Knocking
Massscan
RustScan
Naabu
References
Last updated