mirror of
https://github.com/onceupon/Bash-Oneliner.git
synced 2024-11-22 12:57:01 +00:00
Networking
- Scan for open ports and OS and version detection
This commit is contained in:
parent
7e9a091b3f
commit
7aba786152
59
README.md
59
README.md
@ -1851,32 +1851,6 @@ joe /etc/environment
|
|||||||
ulimit -u
|
ulimit -u
|
||||||
```
|
```
|
||||||
|
|
||||||
##### Which ports are listening for TCP connections from the network
|
|
||||||
```bash
|
|
||||||
#notice that some companies might not like you using nmap
|
|
||||||
nmap -sT -O localhost
|
|
||||||
|
|
||||||
# check port 0-65535
|
|
||||||
nmap -p0-65535 localhost
|
|
||||||
```
|
|
||||||
##### Check if a host is up and scan for open ports, also skip host discovery.
|
|
||||||
#skips checking if the host is alive which may sometimes cause a false positive and stop the scan.
|
|
||||||
$ nmap google.com -Pn
|
|
||||||
|
|
||||||
# Example output:
|
|
||||||
# Starting Nmap 7.01 ( https://nmap.org ) at 2020-07-18 22:59 CST
|
|
||||||
# Nmap scan report for google.com (172.217.24.14)
|
|
||||||
# Host is up (0.013s latency).
|
|
||||||
# Other addresses for google.com (not scanned): 2404:6800:4008:802::200e
|
|
||||||
# rDNS record for 172.217.24.14: tsa01s07-in-f14.1e100.net
|
|
||||||
# Not shown: 998 filtered ports
|
|
||||||
# PORT STATE SERVICE
|
|
||||||
# 80/tcp open http
|
|
||||||
# 443/tcp open https
|
|
||||||
#
|
|
||||||
# Nmap done: 1 IP address (1 host up) scanned in 3.99 seconds
|
|
||||||
|
|
||||||
|
|
||||||
##### Print out number of cores/ processors
|
##### Print out number of cores/ processors
|
||||||
```bash
|
```bash
|
||||||
nproc --all
|
nproc --all
|
||||||
@ -2364,10 +2338,41 @@ nc -vw5 google.com 22
|
|||||||
$ sudo nc -l 80
|
$ sudo nc -l 80
|
||||||
# then you can connect to the 80 port from another server (e.g. server B):
|
# then you can connect to the 80 port from another server (e.g. server B):
|
||||||
# e.g. telent <server A IP address> 80
|
# e.g. telent <server A IP address> 80
|
||||||
# then type sth in server B
|
# then type something in server B
|
||||||
# and you will see the result in server A!
|
# and you will see the result in server A!
|
||||||
```
|
```
|
||||||
|
|
||||||
|
##### Check which ports are listening for TCP connections from the network
|
||||||
|
```bash
|
||||||
|
#notice that some companies might not like you using nmap
|
||||||
|
nmap -sT -O localhost
|
||||||
|
|
||||||
|
# check port 0-65535
|
||||||
|
nmap -p0-65535 localhost
|
||||||
|
```
|
||||||
|
##### Check if a host is up and scan for open ports, also skip host discovery.
|
||||||
|
#skips checking if the host is alive which may sometimes cause a false positive and stop the scan.
|
||||||
|
$ nmap google.com -Pn
|
||||||
|
|
||||||
|
# Example output:
|
||||||
|
# Starting Nmap 7.01 ( https://nmap.org ) at 2020-07-18 22:59 CST
|
||||||
|
# Nmap scan report for google.com (172.217.24.14)
|
||||||
|
# Host is up (0.013s latency).
|
||||||
|
# Other addresses for google.com (not scanned): 2404:6800:4008:802::200e
|
||||||
|
# rDNS record for 172.217.24.14: tsa01s07-in-f14.1e100.net
|
||||||
|
# Not shown: 998 filtered ports
|
||||||
|
# PORT STATE SERVICE
|
||||||
|
# 80/tcp open http
|
||||||
|
# 443/tcp open https
|
||||||
|
#
|
||||||
|
# Nmap done: 1 IP address (1 host up) scanned in 3.99 seconds
|
||||||
|
|
||||||
|
##### Scan for open ports and OS and version detection (e.g. scan the domain "scanme.nmap.org")
|
||||||
|
```bash
|
||||||
|
$ nmap -A -T4 scanme.nmap.org
|
||||||
|
# -A to enable OS and version detection, script scanning, and traceroute; -T4 for faster execution
|
||||||
|
```
|
||||||
|
|
||||||
##### Look up website information (e.g. name server), searches for an object in a RFC 3912 database.
|
##### Look up website information (e.g. name server), searches for an object in a RFC 3912 database.
|
||||||
```bash
|
```bash
|
||||||
whois google.com
|
whois google.com
|
||||||
|
Loading…
Reference in New Issue
Block a user