Network Pentest
arp-scan
arp-scan --localnet 192.168.1.0/24netdiscovery
netdiscovery -r 172.20.0.0/24BruteSpray
python brutespray.py --file nmap.gnmap -U /usr/share/wordlist/user.txt -P /usr/share/wordlist/pass.txt --threads 5 --hosts 5python brutespray.py --file nmap.gnmap --service ftp,ssh,telnet --threads 5 --hosts 5python brutespray.py --file nmap.gnmap -u admin -p password --threads 5 --hosts 5python brutespray.py --file nmap.gnmap --threads 5 --hosts 5 -cIMCP SCAN
TCP LARGE SCAN
HTTP PORT SCAN
UDP SCAN
SCTP SCAN
Internal/On-Site Scan
Passsive wardriving
Active wardriving
Normal Network scan
1. Nmap:
Large Network Scan
1. Masscan:
2. Zmap:
3. Unicornscan :
4. hping :
Nmap Basics
Default Scripts + Server Version check
If cannot ping , just scan all port
Check for subnets
Check for SMB vulnerability
Check for SSL
Check all scripts
Check for subdomain
Bypass Firewall Techniques
MAC Address Spoofing : change mac address to bypass MAC address-based filters
Advanced one-liner :
Threader3000
Last updated