projectdiscovery / naabu

A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests
https://projectdiscovery.io
MIT License
4.7k stars 548 forks source link

How to pass hostname to nmap, not ips #535

Closed local-host-poc closed 1 year ago

local-host-poc commented 1 year ago

Discussed in https://github.com/projectdiscovery/naabu/discussions/479

Originally posted by **Aaronepower** November 17, 2022 when I pass naabu to nmap, it will pass ip to nmap not hostname, how can I pass hostname to nmap? > echo hackerone.com | naabu -silent -nmap-cli 'nmap' ``` hackerone.com:8443 hackerone.com:8080 hackerone.com:443 hackerone.com:80 Starting Nmap 7.80 ( https://nmap.org ) at 2022-11-17 16:15 UTC Nmap scan report for 104.16.99.52 Host is up (0.00067s latency). PORT STATE SERVICE 80/tcp open http 443/tcp open https 8080/tcp open http-proxy 8443/tcp open https-alt Nmap done: 1 IP address (1 host up) scanned in 0.05 seconds ``` #### Expected: > echo hackerone.com | naabu -silent -nmap-cli 'nmap' ``` hackerone.com:8443 hackerone.com:8080 hackerone.com:443 hackerone.com:80 Starting Nmap 7.80 ( https://nmap.org ) at 2022-11-17 16:15 UTC Nmap scan report for hackerone.com Host is up (0.00067s latency). PORT STATE SERVICE 80/tcp open http 443/tcp open https 8080/tcp open http-proxy 8443/tcp open https-alt Nmap done: 1 IP address (1 host up) scanned in 0.05 seconds ```
ehsandeep commented 1 year ago

@local-host-poc see https://github.com/projectdiscovery/naabu/discussions/479#discussioncomment-5112999