🖥️
Siber Güvenlik Notları
  • WHOAMI
    • 👨‍💻Who Am I?
  • 🔭Information Gathering
    • Pentest VM Setup
    • Passive Information Gathering
    • Subdomain Enumeration
    • Host Discovery
    • Port Scanning
    • Email Enumeration
    • Leaked Passwords
    • Zafiyet Araştırma
  • 🪟Windows Pentesting
    • Windows Privilege Escalation
    • Windows Persistence
    • Windows Lateral Movement
    • AV Evasion
  • 🐧Linux Pentesting
    • Linux Privilege Escalation
    • Linux Persistence
    • Linux Lateral Movement
  • 🕸️Web Application Pentesting
    • Web Pentest Checklist
    • SQL Injection
    • NoSQL Injection
    • OS Command Injection
    • XXE Injection
    • SSTI
    • XSS
    • CSRF
    • SSRF
    • LFI/RFI
    • Insecure Deserialization
    • CORS Misconfiguration
    • Directory Traversal
    • File Upload
    • Broken Authentication
    • Broken Access Control
    • Business Logic
    • Race Conditions
    • Web Cache Deception
    • AWS Testing
    • Web Cache Poisoning
    • Clickjacking
    • API Testing
    • Broken Link Hijacking
    • HTTP Request Smuggling
    • LLM
    • HTTP Host Header Attack
    • OAuth Zafiyetleri
    • GraphQL API
    • HTTP Parameter Pollution
    • Configuration and Deployment Management Testing
    • Information Disclosure
    • Prototype pollution
    • JWT
  • 🖲️Network Service Pentesting
    • 📘Active Directory Services
      • Bleeding Edge Vulns
      • Misconfigs
      • Domain Trust
      • DNS (53)
      • Kerberos (88)
      • LDAP (389,636)
      • RPC WMI (135)
      • SMB (445)
      • WinRM - 5985
    • 📂FTP - 21
    • 🔐SSH - 22
    • 🤣Telnet - 23
    • SMTP - 25
    • TFTP - 69 UDP
    • HTTP - 80,443
      • Apache
      • Joomla
      • Drupal
      • Wordpress
      • WEBDAV
      • PHP
      • Laravel
    • IMAP/POP3 - 110,143,993,995
    • SNMP - 161
    • Rservices - 512
    • IPMI - 623
    • Rsync - 873
    • MSSQL - 1433
    • Oracle TNS - 1521
    • NFS - 2049
    • Docker
    • Grafana - 3000
    • MySQL - 3306
    • RDP - 3389
    • Postgresql - 5432
    • Redis - 6379
    • JDWP - 8000
    • MongoDB - 27017
  • 🕸️Network Pentesting
    • ARP Poisoning
  • 📞Android Pentesting
    • Android Derleme Süreci
    • Reversing
    • Rooting
    • Burp Suite Sertifikası
    • SSL Pinning Bypass
    • Patching
    • MobSF Kurulumu
    • Flutter Pentesting
  • 📰Teori
    • Güvenlik Ürünleri
    • OSI
    • Security Principles
  • Diger
    • Hacking Gadgets
      • Wifi Pineapple
      • Pwnagotchi
    • Stego
    • Buffer Overflow
    • Phishing
    • Nessus
    • DDOS Attacks
    • MSFConsole
  • ⏪Reverse
    • GCC Reverse
    • Python Reverse
    • Flare VM
    • Remnux
  • 🛜Wireless Pentesting
    • Wireless Pentest
    • Wireless V2
Powered by GitBook
On this page
  • Nmap ile Port Scan
  • MassScan
  • RustScan
  • Linux Manuel

Was this helpful?

  1. Information Gathering

Port Scanning

Nmap ile Port Scan

nmap -p- -v -sV -sC -T4 -Pn --open -oA scan -iL scope.txt

nmap -iL ip.txt -v -sV -T4 --open -oA ./output --script smb-vuln*,smtp-open-relay,mysql-empty-password,ms-sql-empty-password,ftp-anon

nmap -p 80,443,8000,8080,8180,8888,10000 192.168.1.3 # Port seçme (Web Ports)
nmap --top-ports 100 192.168.1.3
nmap -p- 192.168.1.3  # Bütün portlar
nmap --open 192.168.1.3  # Sadece acik portlari goster
nmap -Pn 192.168.1.3  # Ping atma

nmap -sU 192.168.1.3  # UDP scan
nmap -sV 192.168.1.3  # Version scan
nmap -sV -sC 192.168.1.3  # Script scan
nmap -sV -O 192.168.1.3  # OS detection
nmap --script vuln 192.168.1.3  # Vuln Scan
nmap --script-updatedb # update db

nmap -T4 192.168.1.3  # Script hızı
nmap -oN scan.txt 192.168.1.3  # Output
nmap -oX scan.xml 192.168.1.3  # Output
nmap -iL scope.txt # Input
nmap -oA ./scan

xsltproc scan.xml -o test.html
nmap --script-help "*mysql*"
ls -l /usr/share/nmap/scripts/*snmp*

nmap -S 192.168.1.1 -e tun0 -Pn 192.168.1.3 # Source IP adresini değiştirir (Firewall Bypass)
nmap -D RND:5 192.168.1.3  # Decoy ile tarama yapar (Firewall Bypass)
nmap --source-port 53 192.168.1.3 # Source Port (Firewall Bypass)

nmap --min-rate 4500 --max-rtt-timeout 1500ms 192.168.1.3 # Abartı hız

MassScan

Eğer portları çok hızlı taramak isterseniz bu komutu kullanabilirsiniz. Sonuçlar bazen yanıltıcı olabilir.

masscan --rate=10000 <IP>

RustScan

rustscan --ulimit 5000 -a 192.168.1.3 

Linux Manuel

for i in $(seq 1 254); do nc -zv -w 1 172.16.50.$i 445; done
PreviousHost DiscoveryNextEmail Enumeration

Last updated 5 months ago

Was this helpful?

Hem çok hızlı hem otomatik nmap taraması yapıyor. Muhteşemli bir araç. Yavaş ağlarda sıkıntı yaratabilir

🔭
😄