Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
O
oh-my-zsh
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
JIRA
JIRA
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
github
oh-my-zsh
Commits
0dc7b5c0
Commit
0dc7b5c0
authored
Feb 12, 2015
by
uberspot
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
add nmap plugin with some aliases for scan modes
parent
677acc3a
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
60 additions
and
0 deletions
+60
-0
README.md
plugins/nmap/README.md
+32
-0
nmap.plugin.zsh
plugins/nmap/nmap.plugin.zsh
+28
-0
No files found.
plugins/nmap/README.md
0 → 100644
View file @
0dc7b5c0
# Nmap aliases plugin
Adds some useful aliases for nmap similar to the profiles in zenmap.
Nmap options are:
*
-sS - TCP SYN scan
*
-v - verbose
*
-T1 - timing of scan. Options are paranoid (0), sneaky (1), polite (2), normal (3), aggressive (4), and insane (5)
*
-sF - FIN scan (can sneak through non-stateful firewalls)
*
-PE - ICMP echo discovery probe
*
-PP - timestamp discovery probe
*
-PY - SCTP init ping
*
-g - use given number as source port
*
-A - enable OS detection, version detection, script scanning, and traceroute (aggressive)
*
-O - enable OS detection
*
-sA - TCP ACK scan
*
-F - fast scan
*
--script=vulscan - also access vulnerabilities in target
## Aliases explained
*
nmap_open_ports - scan for open ports on target
*
nmap_list_interfaces - list all network interfaces on host where the command runs
*
nmap_slow - slow scan that avoids to spam the targets logs
*
nmap_fin - scan to see if hosts are up with TCP FIN scan
*
nmap_full - aggressive full scan that scans all ports, tries to determine OS and service versions
*
nmap_check_for_firewall - TCP ACK scan to check for firewall existence
*
nmap_ping_through_firewall - Host discovery with SYN and ACK probes instead of just pings to avoid firewall
restrictions
*
nmap_fast - Fast scan of the top 300 popular ports
*
nmap_detect_versions - detects versions of services and OS, runs on all ports
*
nmap_check_for_vulns - uses vulscan script to check target services for vulnerabilities
plugins/nmap/nmap.plugin.zsh
0 → 100644
View file @
0dc7b5c0
# Some useful nmap aliases for scan modes
# Nmap options are:
# -sS - TCP SYN scan
# -v - verbose
# -T1 - timing of scan. Options are paranoid (0), sneaky (1), polite (2), normal (3), aggressive (4), and insane (5)
# -sF - FIN scan (can sneak through non-stateful firewalls)
# -PE - ICMP echo discovery probe
# -PP - timestamp discovery probe
# -PY - SCTP init ping
# -g - use given number as source port
# -A - enable OS detection, version detection, script scanning, and traceroute (aggressive)
# -O - enable OS detection
# -sA - TCP ACK scan
# -F - fast scan
# --script=vulscan - also access vulnerabilities in target
alias
nmap_open_ports
=
"nmap --open"
alias
nmap_list_interfaces
=
"nmap --iflist"
alias
nmap_slow
=
"nmap -sS -v -T1"
alias
nmap_fin
=
"nmap -sF -v"
alias
nmap_full
=
"nmap -sS -T4 -PE -PP -PS80,443 -PY -g 53 -A -p1-65535 -v"
alias
nmap_check_for_firewall
=
"nmap -sA -p1-65535 -v -T4"
alias
nmap_ping_through_firewall
=
"nmap -PS -PA"
alias
nmap_fast
=
"nmap -F -T5 --top-ports 300"
alias
nmap_detect_versions
=
"nmap -sV -p1-65535 -O --osscan-guess -T4 -Pn"
alias
nmap_check_for_vulns
=
"nmap --script=vulscan"
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment