Port Scanning π
The best option to identify Ports, Protocols, and Services (PPS) on a target would be to scan all ports (65535) of the remote system.
TCP Scanning
Nmap
Simply Scan
nmap -p- --open T5 -v -n IP
nmap --top-ports 5000 --open -T5 -v -n IPComplex Scan
nmap -sV -A --script=default,vuln -p PORTS IPMasscan
sudo masscan -p[PORTS] [IP/MASK] --rate=1000 -e [IFACE] --router-ip [GATEWAY]Bash Port Scanner
#!/bin/bash
# Usage ./portScanner.sh IP
trap ctrl_c INT
function ctrl_c(){
echo -e "\n\n[*] Exiting....\n"
tput cnorm; exit 0
}
for port in $(seq 1 65535);do
timeout 0.1 bash -c "echo '' < /dev/tcp/$1/$port" 2>/dev/null && echo "Port $port - OPEN" &
done; wait
tput cnormUDP Scanning
Last updated