Keith O'Brien Blog - Information and Cyber Security
  • Blog
  • Resume
  • Security Resources

Example Settings for Nmap

2/7/2012

 
nmap --spoof-mac Apple --traceroute --data-length 9 \ 
-f -D 192.168.200.200,RND:5,ME -v \
-n -O -sS -sV -oA /home/pentest/192.168.1.1 \
--log-errors -append-output \
-p T:1-1024,1433,2222,2249,7778,8080,9999 \  
--randomize-hosts 192.168.1.1 192.168.1.2 <target>



Output traceroute

--trace-route

Append random data to sent packets for IDS evasion

--data-length <num>

fragment packets into 8 byte segments for IDS evasion


-f

Stealth SYN Scan

-sS

Decoy IP Address.  Uses these addresses to scan the target

-D

Chooses 5 other random ip addresses and also generates scans from these

RND:5

Place my scan at the 6 position after the 5 random which increases
the probability that I won't be logged

,ME


No DNS resolution

-n


OS Detection

-O


Change MAC address for scans

--spoof-mac


TCP scan only

-p ports :T


randomize the targets if there are more than 1

--randomize-hosts   


The above will output 3 files.   One of the files will be an XML file.

    RSS Feed

    Categories

    All
    Asa
    Cisco
    Cloud
    Google GCP
    Ipv6
    Network Management
    Nmap
    Os X
    Reconnaissance
    Security
    Vpn

Powered by Create your own unique website with customizable templates.
  • Blog
  • Resume
  • Security Resources