Closed blackhatethicalhacking closed 2 years ago
Ok i think i understand now, so if i use sn1per -t and use the above config modification it works, i saw that you already have preconfigured under /config more configuration like stealth, super stealth that does it, so i think thats how it is :)
such as:
110 NMAP_OPTIONS="-Pn -sS --privileged -n -PE -v --max-retries 3 --min-rtt-timeout 500ms --max-rtt-timeout 3000ms --in> 111
Which u have under super stealth, so if i load this config, it should work right?
Hello ! Hope u are doing well :)
Just a quick question, since sometimes u have some targets that are using strict and aggressive defensive mechanisms, the only way to detect open ports, using nmap, since if u use default nmap settings, and even tried the stealth, u get either all ports are filtered or ignored, so the best way is to use something like: -Pn -A -O and this, if i use nmap manually it gets me the results, and if it does, sn1per depending on what ports are found open it will resume with its workflow to perform further attacks.
Is there a way to edit the way nmap scans?
I found these, under kali:
/usr/share/sniper/sniper.conf
And
/root/.sniper.conf
NMAP OPTIONS
NMAP_OPTIONS="-Pn -A -O --script-args http.useragent='' --open"
Is this the way to modify how nmap will work? i added the -Pn -A -O?
Must i change also something below?
NMAP PORT CONFIGURATIONS
QUICK_PORTS="21,22,80,443,8000,8080,8443" DEFAULT_PORTS="10000,1099,110,111,123,135,137,139,1433,1524,161,162,16992,2049,21,2121,2181,22,23,25,264,27017,27018,2> FULL_PORTSCAN_PORTS="T:1-65535,U:53,U:67,U:68,U:69,U:88,U:161,U:162,U:137,U:138,U:139,U:389,U:500,U:520,U:2049" THREADS="100"