Cheat sheets for various stuff
Task | Option |
---|---|
Write packets to file (1) | -w FILE |
Read from specified interface | -i IFACE |
Don’t resolve adresses to names | -n |
Don’t resolve adresses and port numbers | -nn |
Verbose output | -v , -vv , -vvv |
(1) This saved file (.pcap extension is customary) can then be imported in Wireshark for further study.
Task | Command |
---|---|
List available network interfaces | tcpdump -D |
Packets to/from HOST | tcpdump host HOST |
Packets to HOST | tcpdump dst HOST |
Packets from HOST | tcpdump src HOST |
Packets to/from PORT | tcpdump port PORT |
Ping (echo request/reply) | tcpdump icmp |
Only UDP traffic | tcpdump udp |
ssh root@remotesystem 'tcpdump -s0 -c 1000 -nn -w - not port 22' | wireshark -k -i
sudo tcpdump -nn -v port ftp or ftp-data
sudo tcpdump -v -n port 67 or 68
Assume that all scanning types need root permissions.
Task | Command |
---|---|
TCP connect scan | nmap -sT TARGET |
TCP SYN scan | nmap -sS TARGET |
UDP scan | nmap -sU TARGET |
Determine target OS | nmap -O TARGET |
Determine server software/versions | nmap -A TARGET |
Ping scan (enumerate hosts) | nmap -sP TARGETS |
Task | Command |
---|---|
Scan IP subnet | nmap 192.168.56.0/24 |
Scan specific hosts | nmap 172.16.5-10.1-128 |
Only scan specified ports: | nmap -p BEGIN-END |
You can enumerate specific targets to scan them by specifying a range x-y
, or
separated with commas (a,b,c
). Examples:
Example: Check if a DHCP server is available (broadcast DHCP DISCOVER).
$ sudo nmap --script broadcast-dhcp-discover
Starting Nmap 6.40 ( http://nmap.org ) at 2018-11-22 11:09 UTC
Pre-scan script results:
| broadcast-dhcp-discover:
| IP Offered: 10.0.2.16
| DHCP Message Type: DHCPOFFER
| Subnet Mask: 255.255.255.0
| Router: 10.0.2.2
| Domain Name Server: 10.0.2.3
| Domain Name: hogent.be
| IP Address Lease Time: 1 day, 0:00:00
|_ Server Identifier: 10.0.2.2
WARNING: No targets were specified, so 0 hosts scanned.
Nmap done: 0 IP addresses (0 hosts up) scanned in 0.14 seconds