nmap quick cheatsheet
sudo nmap 10.129.2.0/24 -sn -oA tnet | grep for | cut -d" " -f5sudo nmap -iL tnetsudo nmap 10.129.2.18 -sn -oA host -PE --packet-trace $ sudo nmap 10.129.2.28 -p 443 --packet-trace --disable-arp-ping -Pn -n --reason -sT Starting Nmap 7.80 ( https://nmap.org ) at 2020-06-15 16:26 CET CONN (0.0385s) TCP localhost > 10.129.2.28:443 => Operation now in progress CONN (0.0396s) TCP localhost > 10.129.2.28:443 => Connected Nmap scan report for 10.129.2.28 Host is up, received user-set (0.013s latency). PORT STATE SERVICE REASON 443/tcp open https syn-ack Nmap done: 1 IP address (1 host up) scanned in 0.04 seconds
Firewall bypass
Last updated