Port Scanning π
The best option to identify Ports, Protocols, and Services (PPS) on a target would be to scan all ports (65535) of the remote system.
TCP Scanning
Nmap
Simply Scan
nmap -p- --open T5 -v -n IP
nmap --top-ports 5000 --open -T5 -v -n IPComplex Scan
nmap -sV -A --script=default,vuln -p PORTS IPMasscan
Masscan is the fastest port scanner, it can scan the whole internet in 6 minutes.
sudo masscan -p[PORTS] [IP/MASK] --rate=1000 -e [IFACE] --router-ip [GATEWAY]Bash Port Scanner
This one is created by @s4vitar:
#!/bin/bash
# Usage ./portScanner.sh IP
trap ctrl_c INT
function ctrl_c(){
echo -e "\n\n[*] Exiting....\n"
tput cnorm; exit 0
}
for port in $(seq 1 65535);do
timeout 0.1 bash -c "echo '' < /dev/tcp/$1/$port" 2>/dev/null && echo "Port $port - OPEN" &
done; wait
tput cnormAnother bash port scanner, but this time more simply.
UDP Scanning
Pentesters often forgot to scan for open UDP ports, although UDP scanning can be unrealiable, there are plenty of attack vectors lurking behind open UDP ports.
Last updated
Was this helpful?