-
Notifications
You must be signed in to change notification settings - Fork 0
/
Labs with commands
54 lines (44 loc) · 1.78 KB
/
Labs with commands
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
Introduction
The Nmap room on TryHackMe provides a foundational understanding of Nmap, a powerful network scanning tool widely used in cybersecurity for network exploration, management, and vulnerability detection.
Commands Used in Scanning
1. Basic Scanning
Command: nmap <IP>
Description: Performs a basic scan to detect open ports and services on a target system.
Example: nmap 10.10.10.10
2. Scanning with Version Detection
Command: nmap -sV <IP>
Description: Detects the versions of services running on open ports.
Example: nmap -sV 10.10.10.10
3. Aggressive Scanning
Command: nmap -A <IP>
Description: Combines OS detection, version detection, script scanning, and traceroute.
Example: nmap -A 10.10.10.10
4. Specific Port Scanning
Command: nmap -p <port> <IP>
Description: Scans a specific port or a range of ports.
Example: nmap -p 22 10.10.10.10
Range Example: nmap -p 20-80 10.10.10.10
5. SYN Scan (Default)
Command: nmap -sS <IP>
Description: Performs a stealth scan by sending SYN packets.
Example: nmap -sS 10.10.10.10
6. UDP Scan
Command: nmap -sU <IP>
Description: Scans for open UDP ports on a target.
Example: nmap -sU 10.10.10.10
7. Service and OS Detection
Command: nmap -sV -O <IP>
Description: Detects services and operating systems running on the target machine.
Example: nmap -sV -O 10.10.10.10
8. Script Scanning
Command: nmap --script <script_name> <IP>
Description: Runs specific NSE (Nmap Scripting Engine) scripts against the target.
Example: nmap --script http-enum 10.10.10.10
9. Firewall Evasion
Command: nmap -D RND:10 <IP>
Description: Randomizes the scan source to bypass firewalls.
Example: nmap -D RND:10 10.10.10.10
10. Save Scan Results
Command: nmap -oN <file_name> <IP>
Description: Saves the output in a human-readable format.
Example: nmap -oN scan_results.txt 10.10.10.10