Open ghost opened 5 years ago
The answer is yes, it should encompass all of the above. How you would enumerate a host (discovery) then actually enumerate the services and potential attack vectors
On Jun 13, 2019, at 9:17 AM, SeanLittle4 notifications@github.com wrote:
Is this about port scans or is it about discovering hosts on the network?
— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub, or mute the thread.
This one site seems to cover all of that. Basically details all the different flags for nmap in an easy to read manner, from ping sweeps to running NSE scripts. I can also find stuff on writing network enumeration scripts if we want to dive in further https://highon.coffee/blog/nmap-cheat-sheet/#nmap-nikto-scan
Reason behind different types of scans https://nmap.org/book/man-port-scanning-techniques.html
Is this about port scans or is it about discovering hosts on the network?