Initial Enumeration
Scanning
NMAP TCP quick
sudo nmap -Pn -v -sS -sV -sC -oN tcp-quick.nmap IPNMAP TCP Full
sudo nmap -Pn -sS --stats-every 3m --max-retries 1 --max-scan-delay 20 --defeat-rst-ratelimit -T4 -p1-65535 -oN tcp-full.nmap -sV IP NMAP TCP - Repeat if extra ports found
sudo nmap -Pn -v -sS -A -oN tcp-extra.nmap -p PORTS IP NMAP UDP quick
sudo nmap -Pn -v -sU -sV --top-ports=30 -oN udp-quick.nmap IPNMAP UDP 1000
sudo nmap -Pn --top-ports 1000 -sU --stats-every 3m --max-retries 1 -T4 -oN udp-1000.nmap IPNMAP UDP - Repeat if extra ports found
sudo nmap -Pn -sU -A -oN udp-extra.nmap -p PORTS IP ICMP Sweep
fping -a -g 10.10.10.0/24 2>/dev/nullARP Scan (Local Network)
Enumeration
FTP - Port 21
SSH - Port 22
Telnet - Port 23
SMTP - Port 25
POP - PORT 110
DNS - Port 53
Kerberos - Port 88
Indication that it's a DC
Netbios - Port 139
RPC - PORT 135
LDAP - Ports 389,636,3268,326
SNMP - Port 161
Oracle - Port 1521
MySQL - Port 3306
WEB - PORT 80 / 443
SMB - Ports
NFS - Port 2049
TFTPD - UDP 69
Automation Tools
AutoRecon
NmapAutomator
Finding exploits
Last updated