1N3 / Sn1per

Attack Surface Management Platform
https://sn1persecurity.com
Other
7.77k stars 1.8k forks source link

Nmap Config Scan Change #389

Closed blackhatethicalhacking closed 2 years ago

blackhatethicalhacking commented 2 years ago

Hello ! Hope u are doing well :)

Just a quick question, since sometimes u have some targets that are using strict and aggressive defensive mechanisms, the only way to detect open ports, using nmap, since if u use default nmap settings, and even tried the stealth, u get either all ports are filtered or ignored, so the best way is to use something like: -Pn -A -O and this, if i use nmap manually it gets me the results, and if it does, sn1per depending on what ports are found open it will resume with its workflow to perform further attacks.

Is there a way to edit the way nmap scans?

I found these, under kali:

/usr/share/sniper/sniper.conf

And

/root/.sniper.conf

NMAP OPTIONS

NMAP_OPTIONS="-Pn -A -O --script-args http.useragent='' --open"

Is this the way to modify how nmap will work? i added the -Pn -A -O?

Must i change also something below?

NMAP PORT CONFIGURATIONS

QUICK_PORTS="21,22,80,443,8000,8080,8443" DEFAULT_PORTS="10000,1099,110,111,123,135,137,139,1433,1524,161,162,16992,2049,21,2121,2181,22,23,25,264,27017,27018,2> FULL_PORTSCAN_PORTS="T:1-65535,U:53,U:67,U:68,U:69,U:88,U:161,U:162,U:137,U:138,U:139,U:389,U:500,U:520,U:2049" THREADS="100"

blackhatethicalhacking commented 2 years ago

Ok i think i understand now, so if i use sn1per -t and use the above config modification it works, i saw that you already have preconfigured under /config more configuration like stealth, super stealth that does it, so i think thats how it is :)

such as:

NMAP OPTIONS

110 NMAP_OPTIONS="-Pn -sS --privileged -n -PE -v --max-retries 3 --min-rtt-timeout 500ms --max-rtt-timeout 3000ms --in> 111

Which u have under super stealth, so if i load this config, it should work right?