Go Back


TCP Scanning with Netcat

Switches:

-n: numeric addresses only

-vv: very verbose

-w: timeout in seconds

-z: zero-I/O mode [used for scanning]


UDP Scanning with Netcat

Switches:

-u: udp mode


Traffic Accountability with iptables

Switches:

-I: insertion - Using a rule with the insertion option will add it to the beginning of a chain and will be applied first. To indicate a specific placement in the chain, you may also use a number with the -I option

-s: source - indicates the source for said packet filtering

-j: jump - what action will be performed if the packet is a match

-d: destination - specifies the destination address

-Z: zero - zeroes counters in all chains

-F: flush - flush all rules


Viewing the Output

Switches:

-u: verbose output

-n: numeric addresses only

-L: list the rules in a chain or all chains


Greppable Output

Switches:

-oG: - output greppable format followed by output file


Scan range for single open port

Switches:

-p: specify port (or range)


Scan range for only common ports

Switches:

-A: enable OS detection, version detection, script scanning and traceroute

--top-ports=20: scan only the 20 of the top [or common] ports


OS FingerPrinting

Switches:

-O: OS detection


Banner Grabbing/Service Enumeration

Switches:

-sT: TCP Scan

-sV: probe open ports to determine service/version info


Using NSE Scripts

Switches:

-p: Port range

--script: Name of script

SCRIPT DEFAULT STORAGE LOCATION: /usr/share/nmap/scripts


General Recon [Start Recon]

Switches:

-sC: default scripts

-sV: service version

-oA: output all formats + file name