dotfiles/.oh-my-zsh/plugins/nmap
2020-06-29 00:32:26 +02:00
..
nmap.plugin.zsh Add Oh my zsh configs 2020-06-29 00:32:26 +02:00
README.md Add Oh my zsh configs 2020-06-29 00:32:26 +02:00

Nmap plugin

Adds some useful aliases for Nmap similar to the profiles in zenmap.

To use it, add nmap to the plugins array in your zshrc file:

plugins=(... nmap)

Aliases

  • nmap_open_ports: scan for open ports on target.
  • nmap_list_interfaces: list all network interfaces on host where the command runs.
  • nmap_slow: slow scan that avoids to spam the targets logs.
  • nmap_fin: scan to see if hosts are up with TCP FIN scan.
  • nmap_full: aggressive full scan that scans all ports, tries to determine OS and service versions.
  • nmap_check_for_firewall: TCP ACK scan to check for firewall existence.
  • nmap_ping_through_firewall: host discovery with SYN and ACK probes instead of just pings to avoid firewall restrictions.
  • nmap_fast: fast scan of the top 300 popular ports.
  • nmap_detect_versions: detects versions of services and OS, runs on all ports.
  • nmap_check_for_vulns: uses vulscan script to check target services for vulnerabilities.
  • nmap_full_udp: same as full but via UDP.
  • nmap_traceroute: try to traceroute using the most common ports.
  • nmap_full_with_scripts: same as nmap_full but also runs all the scripts.
  • nmap_web_safe_osscan: little "safer" scan for OS version as connecting to only HTTP and HTTPS ports doesn't look so attacking.
  • nmap_ping_scan: ICMP scan for active hosts.