User Tools

Site Tools


nmap:aggressive_nmap_scanning

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
nmap:aggressive_nmap_scanning [2016/07/08 00:39] peternmap:aggressive_nmap_scanning [2019/12/01 10:50] (current) – removed peter
Line 1: Line 1:
-====== nmap - Aggressive nmap scanning ====== 
- 
-<code bash> 
-sudo nmap -sS -p- -PS80,22 -n -T4 -vvv –reason 192.168.1.69 
-</code> 
- 
-Result: 
- 
-<code> 
-Starting Nmap 6.40 ( http://nmap.org ) at 2016-07-08 01:38 BST 
-Failed to resolve "–reason". 
-Initiating SYN Stealth Scan at 01:38 
-Scanning 192.168.1.69 [65535 ports] 
-Discovered open port 139/tcp on 192.168.1.69 
-Discovered open port 445/tcp on 192.168.1.69 
-Discovered open port 80/tcp on 192.168.1.69 
-Discovered open port 17500/tcp on 192.168.1.69 
-Completed SYN Stealth Scan at 01:38, 6.53s elapsed (65535 total ports) 
-Nmap scan report for 192.168.1.69 
-Host is up (0.000019s latency). 
-Scanned at 2016-07-08 01:38:40 BST for 7s 
-Not shown: 65531 closed ports 
-PORT      STATE SERVICE 
-80/tcp    open  http 
-139/tcp   open  netbios-ssn 
-445/tcp   open  microsoft-ds 
-17500/tcp open  db-lsp 
- 
-Read data files from: /usr/bin/../share/nmap 
-Nmap done: 1 IP address (1 host up) scanned in 6.62 seconds 
-           Raw packets sent: 65553 (2.884MB) | Rcvd: 131110 (5.507MB) 
-</code> 
  
nmap/aggressive_nmap_scanning.1467938370.txt.gz · Last modified: 2020/07/15 09:30 (external edit)

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki