Scanning

  1. Use UDP nmap scan

  2. Scan with nmap -vv -T5 if autorecon slow

  3. Use masscan

  4. Use --script=vuln / --script = [service]*

  5. nikto -h web_app:port

Service Banners/version:

  1. nc IP PORT

  2. Service utility

  3. Web page source/footer

  4. CHANGELOG.txt

  5. README.txt

  6. LICENSE.txt

nc Port scan:

  1. nc -z -w 1 -v IP PORTRANGE (start-end) 2>&1 | grep -I succeeded

Last updated