Nmap Cheatsheet by Muthumohanprasath
Nmap Cheatsheet by Muthumohanprasath
Note:
Wireshark Filters Firewall Bypass Commands Comments
ip.addr==ipaddress
Bypass Firewall Use only on the non-windows system to bypass the firew
For scanning the UDP ports
It sets all the TCP packet header as FIN
Sends the packet with FIN, URG ,PUSH flag
Used to determine the state of the firewall
Used to bypass some Firewall rules on the internal system scan
l file format.
Note:
Red Box indicates the firewall Bypassing Scripts
Blue Box indicates the service based enumeration and attack based scripts
Green Box indicates the vulnerability Scanning related scripts.
system to bypass the firewall
G ,PUSH flag
all Detection
Which looks like the tree structure of the files that are presented on the webpages of the target website
are the HTTP crawlers are allowed to crawl against the target website
he sensitive directories against the target webserver
get system is vulnerable to SMTP open Relay Attack or not
SMTP usernames of the target server
r the SMTP service
erver's smtp service, If the SMTP service is running on the target server apart from the defautl port, Then there is a possibility of running t
e the supported commands from the POP3 service
e the supported commands from the IMAP service
ement
vent thethe
OSsize of the packet, Basically default TCP packet size is 16 bytes.
detection.
e to whether the target system is behind the IDS or Firewall.
reduce the fragment size of the of the packet to bypass the firewalls.
ewall or IDS -> for this scan you will get the reply. Else you will not get the reply for this scan.
the old firewalls
ere is a possibility of running the SMTP backdoor on that server