nmap:aggressive_nmap_scanning
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
nmap:aggressive_nmap_scanning [2016/07/08 00:39] – peter | nmap:aggressive_nmap_scanning [2019/12/01 10:50] (current) – removed peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== nmap - Aggressive nmap scanning ====== | ||
- | |||
- | <code bash> | ||
- | sudo nmap -sS -p- -PS80,22 -n -T4 -vvv –reason 192.168.1.69 | ||
- | </ | ||
- | |||
- | Result: | ||
- | |||
- | < | ||
- | Starting Nmap 6.40 ( http:// | ||
- | Failed to resolve " | ||
- | Initiating SYN Stealth Scan at 01:38 | ||
- | Scanning 192.168.1.69 [65535 ports] | ||
- | Discovered open port 139/tcp on 192.168.1.69 | ||
- | Discovered open port 445/tcp on 192.168.1.69 | ||
- | Discovered open port 80/tcp on 192.168.1.69 | ||
- | Discovered open port 17500/tcp on 192.168.1.69 | ||
- | Completed SYN Stealth Scan at 01:38, 6.53s elapsed (65535 total ports) | ||
- | Nmap scan report for 192.168.1.69 | ||
- | Host is up (0.000019s latency). | ||
- | Scanned at 2016-07-08 01:38:40 BST for 7s | ||
- | Not shown: 65531 closed ports | ||
- | PORT STATE SERVICE | ||
- | 80/ | ||
- | 139/ | ||
- | 445/ | ||
- | 17500/tcp open db-lsp | ||
- | |||
- | Read data files from: / | ||
- | Nmap done: 1 IP address (1 host up) scanned in 6.62 seconds | ||
- | Raw packets sent: 65553 (2.884MB) | Rcvd: 131110 (5.507MB) | ||
- | </ | ||
nmap/aggressive_nmap_scanning.1467938370.txt.gz · Last modified: 2020/07/15 09:30 (external edit)