Last active
August 10, 2018 20:37
-
-
Save alexandercastillo1/f7016de3a01da63b3d535315df6f3a9f to your computer and use it in GitHub Desktop.
PortScanThatWorks
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Finding Hosts | |
nmap -v -sn X.X.X.X -oG /root/Desktop/hosts.txt | |
grep Up /root/Desktop/hosts.txt | cut -d " " -f 2 | |
Scan | |
unicornscan -i tap0 -mU X.X.X.X:1-65535 | tee /root/Desktop/victim/udp.txt | |
unicornscan -i tap0 X.X.X.X:1-65535 | tee /root/Desktop/victim/tcp.txt | |
nmap -A -sV -vvvvv -Pn X.X.X.X -oX /root/Desktop/victim/nmapports.xml -oN /root/Desktop/victim/nmapports.txt | |
nmap -A -sV -v3 -O -Pn -pU:x,xx,xxx,T:x,xx,xxx --script vuln X.X.X.X -oX /root/Desktop/victim/nmapvulns.xml -oN /root/Desktop/victim/nmapvulns.txt | |
Upload xml nmap to Searchsploit | |
searchsploit -v -nmap /root/Desktop/victim/nmapvulns.xml | |
Connect to every single service using ncat or telnet trying to find anonymous access to ftp or open access to SSH | |
Identify HTTP ports with amap | |
amap -bqv victimip x xx xxx xxxx | tee /root/Desktop/victim/amap.txt |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment