The document provides instructions for scanning systems using various nmap commands and tools. It lists threader3000 and nikto as tools for scanning, then describes different nmap commands like -Pn, -p-, -sV, -sC to scan for open ports, server versions, and port details. It also mentions half-open scanning with -PS, aggressive scanning with -A, storing output in HTML with -ox and xsltprox, and using http-slowloris to scan for DDoS ports.
The document provides instructions for scanning systems using various nmap commands and tools. It lists threader3000 and nikto as tools for scanning, then describes different nmap commands like -Pn, -p-, -sV, -sC to scan for open ports, server versions, and port details. It also mentions half-open scanning with -PS, aggressive scanning with -A, storing output in HTML with -ox and xsltprox, and using http-slowloris to scan for DDoS ports.
The document provides instructions for scanning systems using various nmap commands and tools. It lists threader3000 and nikto as tools for scanning, then describes different nmap commands like -Pn, -p-, -sV, -sC to scan for open ports, server versions, and port details. It also mentions half-open scanning with -PS, aggressive scanning with -A, storing output in HTML with -ox and xsltprox, and using http-slowloris to scan for DDoS ports.
The document provides instructions for scanning systems using various nmap commands and tools. It lists threader3000 and nikto as tools for scanning, then describes different nmap commands like -Pn, -p-, -sV, -sC to scan for open ports, server versions, and port details. It also mentions half-open scanning with -PS, aggressive scanning with -A, storing output in HTML with -ox and xsltprox, and using http-slowloris to scan for DDoS ports.
nmap -Pn (Ip) = if packets are blocking nmap -Pn -p- (ip) = to list all the ports open on the system nmap -Pn (ip) -p 1-65535 = to list the number of ports want nmap -Pn -sV (ip) = to know the version of the server running nmap -Pn -sC (ip) = to get details about the port nmap -Pn -v (ip) = to knwo what the namp is scanning and ho much packets are trasnfered nmap -PS (ip) = halfr scan nmap -A (ip) or nnmap -Pn -A = agressive scan
u can add -ox after the command to store the output and to convert to html xsltprox (file nam) -o (file name).html