nmap
scans
basic scans
# version of the running services
# -sV: Probe open ports to determine service/version info
# -sC: equivalent to --script=default
nmap -sV -sC 192.165.34.3
# Alternatively
nmap -A 192.165.34.3
scripts
brute
http-proxy-brute
The http-brute script uses, by default, the database files usernames.lst
and passwords.lst
located at /nselib/data/
to try each password, for every user
nmap --script http-proxy-brute -p3128 192.144.18.3
To use different username and password lists, set the arguments userdb
and passdb
:
nmap --script http-proxy-brute -p3128 192.144.18.3 --script-args userdb=usernames.lst,passdb=passwords.lst
discovery
banner
# nmap -sV --script=banner <target>
nmap -sV --script=banner -p- 192.162.110.3