Scanning all 65535 ports on every discovered host loses viability with internal networks with larger numbers of hosts.
Host discovery should be completed separately and the result IP addresses used as an input for port discovery scans
The IP addresses being referenced in these commands should be verified against the in scope & out of scope documentation to confirm scope isn’t being violated at every step of the penetration testing process.
Assumes host up and performs a UDP port scan against the top 2000 UDP Ports
Related
Related Notes
All Related Notes
TABLE file.ctime as "Created", tags as "Tags"FROM "New Notes"WHERE contains(tags, "discovery") OR contains(tags, "nmap") OR contains(tags, "scanning")SORT file.ctime DESC
discovery
TABLE file.ctime as "Created", tags as "Tags"FROM "New Notes"WHERE contains(tags, "discovery")SORT file.ctime DESC
nmap
TABLE file.ctime as "Created", tags as "Tags"FROM "New Notes"WHERE contains(tags, "nmap")SORT file.ctime DESC
scanning
TABLE file.ctime as "Created", tags as "Tags"FROM "New Notes"WHERE contains(tags, "scanning")SORT file.ctime DESC