Scan using NMAP
Detect OS and Services
#nmap -A 192.168.1.1Standard service detection
#nmap -sV 192.168.1.1More aggressive Service Detection :
#nmap -sV — version-intensity 5 192.168.1.1Lighter banner grabbing detection :
#nmap -sV — version-intensity 0 192.168.1.1Scan using default safe scripts :
#nmap -sV -sC 192.168.1.1Get help for a script :
#nmap — script-help=ssl-heartbleedScan using a specific NSE script :
#nmap -sV -p 443 –script=ssl-heartbleed.nse 192.168.1.1Scan with a set of scripts :
#nmap -sV — script=smb* 192.168.1.1Find Information about IP address :
#nmap — script=asn-query,whois,ip-geolocation-maxmind 192.168.1.0/24Gather page titles from HTTP services :
#nmap — script=http-title 192.168.1.0/24Get HTTP headers of web services :
#nmap — script=http-headers 192.168.1.0/24Find web apps from known paths :
#nmap — script=http-enum 192.168.1.0/24
Easily Detect CVEs with Nmap Scripts:
pkg install nmap
cd /data/data/com.termux/files/usr/share/nmap/scripts/
git clone https://github.com/vulnersCom/nmap-vulners.git
git clone https://github.com/scipag/vulscan.git
ls vulscan/*.csvcd vulscan/utilities/updater/
chmod +x updateFiles.sh
./updateFiles.shex. nmap — script nmap-vulners -sV <target IP>
ex. nmap — script vulscan -sV <target IP>
ex. nmap — script nmap-vulners,vulscan — script-args vulscandb=scipvuldb.csv -sV <target IP> for combo scan