Jump to content

Search the Community

Showing results for tags 'nmap'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 11 results

  1. I am using latest Zenmap in case it means anything. Re-learning Nmap. I am trying to nail down the best option to locate where some IP's are by Nmap only. I understand there is always a chance of error. But what option with in Nmap will provide the best options only through Nmap. I have narrowed down so far to The below. nmap -sC -iL ip-list.txt -oA "C:\\\\Users\\\\Universe\\\\Desktop\\\\Logs\\\\ip-List-Results-b" --open --system-dns -Pn --script ip-geolocation-geoplugin --traceroute Am I close? What would you people do if you wanted to nail a location as close as yo
  2. Hi Im trying to use the nmap script http-default-accounts with this command : nmap -d2 -sV --script=http-default-accounts 192.168.0.1 The default fingerprint lua file contains the default password admin and user admin for my cisco router. but the output does not say anything about it. The debug output shows that the default credentials do get checked, but then I get an ssl error on port 80. What am I doing wrong? Debug ouput: npcap service is already running. wpcap.dll present, library version: Npcap version 0.9986, based on libpcap version 1.9.1 Starting Nma
  3. I am trying to use NMap with Google Safe Browsing API to check if a host is malicious or not. I used VirusTotal API for the same purpose and it returned appropriate results but the Google API did not. I am using Kali Linux on VM Ware Player. The commands I have typed are:- 1)nmap -p80 --script http-google-malware <target> 2)nmap $nmap -p80 --script http-google-malware --script-args http-google-malware.api=<API> <target> To use VirusTotal API, I used the command - nmap -sV --script=http-malware-host <target> and it worked. I am expecting an outp
  4. Nmap Quickscan (Cleaned & C2 Enabled) This is a cleaned up output version of the Original Nmap Scan that Hak5 introduces us to. The Payload waits for "Internet Connection" to be present. Once Internet Connection is found, It scans the local subnet for any online devices. - While also logging the Public IP of the Victim's Network (Very useful when you are scanning multiple networks in a short amount of time.) payload.sh #!/bin/bash # Title: Nmap Quickscan (Cleaned & C2 Enabled) # Author: REDD of Private-Locker # Version: 1.0 # # This is a cleaned u
  5. I'm working through the Metasploitable 3 vulnerabilities. One of the frequent ones I see mentioned is Elasticsearch on port 9200. I can't get nmap to identify that port as Elasticsearch. Even when I do a -A -sV --version-all (and a bunch of other noisy scans) the best it can do is say it's the default wap-wsp port. So, I have 2 questions: Will Elasticsearch always be running on that port? Can anything be preventing nmap from identifying it on 9200? I'm running through virtualbox - I've heard it can drop some packets when looking at wireshark, but I haven't heard whether th
  6. Hey y'all, just wanted to share my slightly modified nmap scan payload. It scans a bunch of ports, saves the output with a date stamp and multiple output types, and then uploads the loot to the C2 server. #!/bin/bash # # Title: Custom Nmap Payload for Shark Jack # Author: Flatlinebb # Version: 1.02 # # Scans target subnet with Nmap using specified options. Saves each scan result # to loot storage folder. Uploads loot to your C2 server # # Red ...........Setup # Amber..........Scanning # Green..........Finished # # See nmap --help for options. Default "-sP" ping scans the address space
  7. Module: nmap Version: 1.4 Features: Manage dependencies Configure nmap options Live output Run History Change log: 1.4 Bug fixes
  8. Hi. I have installed the nmap module, and its dependencies, but after that its shows nmap is not running... Can anyone help me?
  9. I installed the module and the dependencies. When I try to run it in the GUI nothing happens, and when I ry to run it from the command line I get "nmap: can't load library 'libpcap.so.1.3'." Is nmap broken or am I doing something wrong?
  10. Was wondering if it is possible to inject packets while the PS is in monitor mode? Or would this be pointless? if possible you could carry out an arp/nmap scan and it could be made to appear it’s coming from the host pc. Obviously I know one of the net modes allows the PS to present one IP on one interface and another IP on the other.
  11. Hello, I'am wondering if following setup would be possible 1x throwing star TAP 1x Packet squirrel Action: Connect both Ethernet cables for sniffing from throwing star to packet squirrel and capture network traffic for both interface to one pcap file Appreciate if anyone can confirm this :)
×
×
  • Create New...