Cybersecurity
Reconnaisance Attack

Using kali linux command line

Nmap Commands

  1. nmap 192.168.1.0/24

    • Description: This command scans all the hosts within the subnet 192.168.1.0/24 (which includes IP addresses from 192.168.1.1 to 192.168.1.254) to discover live hosts and open ports.
    • Usage: Used for network discovery and auditing.
  2. nmap -sP 192.168.1.0/24

    • Description: This command performs a ping scan on the subnet 192.168.1.0/24 to identify which hosts are up without performing a port scan.
    • Usage: Used for a quick check of which devices are online.
  3. nmap -O 192.168.1.7

    • Description: This command performs OS detection on the host 192.168.1.7.
    • Usage: Used to determine the operating system of the target host.
  4. nmap -sV 192.168.1.7

    • Description: This command scans the host 192.168.1.7 to detect service versions on open ports.
    • Usage: Used to gather detailed information about the services running on the host.
  5. nmap -O 192.168.1.5

    • Description: Similar to nmap -O 192.168.1.7, this command performs OS detection on the host 192.168.1.5.
    • Usage: Used to determine the operating system of the target host.
  6. nmap -p 80 192.168.1.7

    • Description: This command scans only port 80 on the host 192.168.1.7.
    • Usage: Used to check the status of a specific port (in this case, the HTTP port).
  7. nmap -F 192.168.1.7

    • Description: This command performs a fast scan on the host 192.168.1.7, scanning fewer ports than the default scan.
    • Usage: Used for a quicker scan of the most common ports.
  8. nmap -f 192.168.1.7

    • Description: This command performs a scan on the host 192.168.1.7 using fragmented packets.
    • Usage: Used to evade firewalls and intrusion detection systems (IDS).
  9. nmap 192.168.1.7

    • Description: This command performs a default scan on the host 192.168.1.7, discovering open ports and basic service information.
    • Usage: Used for a general-purpose scan of a single host.

Hping3 Command

  1. hping3 --scan 1-65535 192.168.1.7 -S --rand-source
    • Description: This command scans all ports (1-65535) on the host 192.168.1.7 using SYN packets, with random source IP addresses.
    • Usage: Used for comprehensive port scanning and to obscure the scan origin.

Fping Command

  1. fping 192.168.1.7
    • Description: This command sends ICMP echo requests to the host 192.168.1.7 to check its availability.
    • Usage: Used for a quick ping check to see if the host is online.

WhatWeb Command

  1. whatweb 192.168.1.7
    • Description: This command scans the web server on 192.168.1.7 to identify technologies used (e.g., CMS, server software).
    • Usage: Used for web fingerprinting to gather information about the web technologies in use.

Nikto Command

  1. nikto -host 192.168.1.7
    • Description: This command performs a vulnerability scan on the web server at 192.168.1.7.
    • Usage: Used for web server security testing to identify potential vulnerabilities.

These commands are commonly used in network security and penetration testing to gather information about hosts and identify potential vulnerabilities.