- AutoRecon:
autorecon -v IP - Nmap: (USE IP instead of domain name as might miss information or scan both)
- Standard TCP port (change sT to sU for UDP):
nmap -n -v -sT -A IP - Full TCP (change sT to sU for UDP):
nmap -n -v -sT -p- -T5 IP - Using results from b.:
nmap -n -v -sT -p ports from b. -A IP - Vulnerability scan:
nmap -sV -sT -pPort --script vuln IP - Backup:
nmap -p- --min-rate 5000 -sV IP2 - Default script:
sudo nmap -sC -sS -p0-65535 IP - Limited scan (eg for 2 host):
nmap --top-ports=1000 -sT -Pn 10.5.5.1,2 --open
- Standard TCP port (change sT to sU for UDP):
Limited Scan
proxychains4 nmap --top-ports=100 -sT -Pn IP --open