Raeltik / red-blue-dev

0 stars 0 forks source link

Mini-Class Material: Host Enumeration (Red) #16

Open ghost opened 5 years ago

SeanLittle4 commented 5 years ago

Is this about port scans or is it about discovering hosts on the network?

ghost commented 5 years ago

The answer is yes, it should encompass all of the above. How you would enumerate a host (discovery) then actually enumerate the services and potential attack vectors

On Jun 13, 2019, at 9:17 AM, SeanLittle4 notifications@github.com wrote:

Is this about port scans or is it about discovering hosts on the network?

— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub, or mute the thread.

SeanLittle4 commented 5 years ago

This one site seems to cover all of that. Basically details all the different flags for nmap in an easy to read manner, from ping sweeps to running NSE scripts. I can also find stuff on writing network enumeration scripts if we want to dive in further https://highon.coffee/blog/nmap-cheat-sheet/#nmap-nikto-scan

SeanLittle4 commented 5 years ago

Reason behind different types of scans https://nmap.org/book/man-port-scanning-techniques.html