External/Internal
Last updated
Last updated
For
Nmap to Markdown:
This is the easiest and fastest way to discover if a host is up or not. You could try to send some ICMP packets and expect responses. The easiest way is just sending an echo request and expect from the response. You can do that using a simple ping
or using fping
for ranges. You could also use nmap to send other types of ICMP packets (this will avoid filters to common ICMP echo request-response).
You could also try to check for some UDP port open to decide if you should pay more attention to a host. As UDP services usually don't respond with any data to a regular empty UDP probe packet it is difficult to say if a port is being filtered or open. The easiest way to decide this is to send a packet related to the running service, and as you don't know which service is running, you should try the most probable based on the port number:
Ensure that the local file with a domain list exists, so make sure that the <DOMAIN_LIST.txt>
file is located in <LOCAL_FOLDER>
.
This is just a TCP port discovery useful when you want to focus on discovering HTTP services:
Masscan only accepts IP addresses and does not support hostnames in its input list. If your input file contains hostnames (like example.com
), that will cause an error, as Masscan cannot resolve them automatically.
Info: Automated Pentest Recon Scanner
Parses all hosts on a subnet/CIDR (ie. 192.168.0.0/16
) and initiates a sniper scan against each host. Useful for internal network scans.
Quickly enumerates open ports/services on multiple hosts and performs basic fingerprinting. To use, specify the full location of the file which contains all hosts, IPs that need to be scanned and run ./sn1per /full/path/to/targets.txt
airstrike to begin scanning.
Info: The following are a collection of online IP Tools that can be used to quickly get information about IP Addresses, Web Pages and DNS records.
These tools are placed here to be a quick reference whether you are assessing your organizations systems, or popping boxes on a penetration testing engagement.
The nmap line proposed before will test the top 1000 UDP ports in every host inside the /24 range but even only this will take >20min. If need fastest results you can use : ./udp-proto-scanner.pl 199.66.11.53/24
This will send these UDP probes to their expected port (for a /24 range this will just take 1 min): DNSStatusRequest, DNSVersionBindReq, NBTStat, NTPRequest, RPCCheck, SNMPv3GetRequest, chargen, citrix, daytime, db2, echo, gtpv1, ike,ms-sql, ms-sql-slam, netop, ntp, rpc, snmp-public, systat, tftp, time, xdmcp.
Using the
You’ll need to resolve the hostnames into IP addresses before running the Masscan scan. Here’s how you can do that:
Repository:
Repo: