Tag: dallas mesothelioma attorneys

Ncat – Swiss Army Knife

Ncat Swiss Army Knife Ncat is a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project as a much-improved reimplementation of the venerable Netcat. It uses both TCP and UDP for communication and is designed to be a reliable back-end tool to instantly

Nmap – Timing & Performance

TIMING AND PERFORMANCE: Options which take <time> are in seconds, or append ‘ms’ (milliseconds), ‘s’ (seconds), ‘m’ (minutes), or ‘h’ (hours) to the value (e.g. 30m). -T<0-5>: Set timing template (higher is faster) –min-hostgroup/max-hostgroup <size>: Parallel host scan group sizes –min-parallelism/max-parallelism <numprobes>: Probe parallelization –min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout <time>: Specifies probe round trip time. –max-retries <tries>: Caps number

Nmap – OS Detection

OS DETECTION: -O: Enable OS detection –osscan-limit: Limit OS detection to promising targets –osscan-guess: Guess OS more aggressively

Nmap – Script Scan

SCRIPT SCAN: -sC: equivalent to –script=default –script=<Lua scripts>: <Lua scripts> is a comma separated list of directories, script-files or script-categories –script-args=<n1=v1,[n2=v2,…]>: provide arguments to scripts –script-args-file=filename: provide NSE script args in a file –script-trace: Show all data sent and received –script-updatedb: Update the script database. –script-help=<Lua scripts>: Show help about scripts. <Lua scripts> is a

Nmap – Port Specification and Scan order

PORT SPECIFICATION AND SCAN ORDER: -p <port ranges>: Only scan specified ports Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080,S:9 -F: Fast mode – Scan fewer ports than the default scan -r: Scan ports consecutively – don’t randomize –top-ports <number>: Scan <number> most common ports –port-ratio <ratio>: Scan ports more common than <ratio>

Nmap – Scan Techniques

SCAN TECHNIQUES: -sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans -sU: UDP Scan -sN/sF/sX: TCP Null, FIN, and Xmas scans –scanflags <flags>: Customize TCP scan flags -sI <zombie host[:probeport]>: Idle scan -sY/sZ: SCTP INIT/COOKIE-ECHO scans -sO: IP protocol scan -b <FTP relay host>: FTP bounce scan

Nmap – Host Discovery

HOST DISCOVERY: -sL: List Scan – simply list targets to scan -sn: Ping Scan – disable port scan -Pn: Treat all hosts as online — skip host discovery -PS/PA/PU/PY[portlist]: TCP SYN/ACK, UDP or SCTP discovery to given ports -PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes -PO[protocol list]: IP Protocol Ping -n/-R: Never do

Nmap – Target Specification

In this section we need to think what we want to do and what is our target, we can scan for a single host or a subnet, use IPs or domains or even scan for especifique ports open using the random argument (-iR). We have three options here pass the IP/Network by argument by file