NMAP
Links and Resources
Operator Handbook: NMAP - pg. 222
Penetration Testing: Port Scanning with NMAP - pg.125
Commands
NSE - Nmap scripting Engine
Nmap Scripting Engine (NSE) allows users to run custom and community generated scripts. ◇ stored in /usr/share/nmap/scripts
The most basic way of running Nmap scripts is by using the -sC option, invoking the default scripts.
To run a specific script against a target, the name of the script must be specified in the command.
As well as specifying the name of the script, it is sometimes necessary to specify arguments to achieve the desired behaviour
Run all NSE scripts against found ports
IDS and IPS Evasion
https://book.hacktricks.xyz/pentesting/pentesting-network/ids-evasion
Send some packets with a TTL enough to arrive to the IDS/IPS but not enough to arrive to the final system. And then, send another packets with the same sequences as the other ones so the IPS/IDS will think that they are repetitions and won't check them, but indeed they are carrying the malicious content.
Nmap option: --ttlvalue <value>
Video Instruction
Hackersploit has one of the best video series on using NMAP.
Last updated
Was this helpful?