Started the Sheet
This commit is contained in:
parent
296b979ac5
commit
f937583036
53
README.md
53
README.md
@ -1,2 +1,55 @@
|
||||
# CTF_CheatSheet
|
||||
|
||||
|
||||
## Stage 1 - Lay of the Land
|
||||
|
||||
### Scans
|
||||
|
||||
#### Nmap
|
||||
|
||||
|
||||
|
||||
|
||||
```powershell
|
||||
nmap -sn -n --disable-arp-ping IP | grep -v "host down"
|
||||
```
|
||||
-sn : Disable port scanning. Host discovery only.
|
||||
-n : Never do DNS resolution
|
||||
|
||||
|
||||
```bash
|
||||
sudo nmap -sSV -p- IP -oA nmap/initial -T4
|
||||
sudo nmap -sSV -oA OUTPUTFILE -T4 -iL INPUTFILE.csv
|
||||
```
|
||||
• the flag -sSV defines the type of packet to send to the server and tells Nmap to try and determine any service on open ports
|
||||
• the -p- tells Nmap to check all 65,535 ports (by default it will only check the most popular 1,000)
|
||||
• -oA OUTPUTFILE tells Nmap to output the findings in its three major formats at once using the filename "OUTPUTFILE"
|
||||
• -iL INPUTFILE tells Nmap to use the provided file as inputs
|
||||
|
||||
> This configuration is enough to do a basic check for a CTF VM
|
||||
```bash
|
||||
nmap -sV -sC -oA nmap/initial IP
|
||||
```
|
||||
-sV : Probe open ports to determine service/version info
|
||||
-sC : to enable the script
|
||||
-oA : to save the results
|
||||
|
||||
After this quick command you can add "-p-" to run a full scan while you work with the previous result
|
||||
|
||||
|
||||
|
||||
> Aggressive NMAP
|
||||
```bash
|
||||
nmap -A -T4 scanme.nmap.org
|
||||
• -A: Enable OS detection, version detection, script scanning, and traceroute
|
||||
• -T4: Defines the timing for the task (options are 0-5 and higher is faster)
|
||||
```
|
||||
|
||||
#### Masscan
|
||||
|
||||
```bash
|
||||
masscan IP -p 1-65535 --rate 100 -oX masscan.xml
|
||||
```
|
||||
|
||||
###
|
||||
|
||||
|
||||
Loading…
Reference in New Issue
Block a user