Port Scanners
CLI Tools
# Ping sweep (no port scanning)
sudo nmap -sn 172.16.10.0/24
# Extract IPs
sudo nmap -sn 172.16.10.0/24 | grep 'report' | awk '{print $NF}'# Top-1000 ports, no dns resolution, no ping request
sudo nmap -n -Pn --open -oG - 192.168.110.0/24 | awk '/Up$/{print $2}'sudo nmap -sV --script=banner.nse -iL live_hosts | grep "|_banner\||_http-server-header"sudo nmap -iL live_hosts -A --open --exclude 172.16.10.1# IP address
rustscan -a <IP>
# With a target file and extract IPs (greppable)
rustscan -a "$(cat live_hosts | tr '\n' ',')" -g | awk -F'->' '{print $1,$2}' | tr -d '[]'
# With a target file and extract IPs (default)
rustscan -a "$(cat live_hosts | tr '\n' ',')"rustscan -a 127.0.0.1 -- -A -sC# Finding open ports
rustscan -a 10.10.11.152 -g --ulimit=5000
# Querying services details
nmap -T4 -min-rate 100000 10.10.11.152 -sV -sC -p $(cat open_ports | awk -F'>' '{print $2}' | tr -d '[]') -PnIPv6 Firewall Bypass
$ sudo nmap -p5985 10.10.10.10
PORT STATE SERVICE
5985/tcp closed unknownLast updated