From 054a604db00f9125a7f6369feb0f83153d05cd78 Mon Sep 17 00:00:00 2001 From: Mika Suomalainen Date: Wed, 26 Oct 2011 15:12:58 +0300 Subject: [PATCH] zsh_aliases: nmap-osscan: scan only 80 and 443 to look less attacking. (See full commit message.) I think that it looks less attacking to scan only widely used HTTP and HTTPS ports instead of scanning all of the 1000 ports which nmap scans by default. If someone wants to scan them, see comment above this alias in zsh_aliases. --- zsh_aliases | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/zsh_aliases b/zsh_aliases index 4212b021..44ac2d09 100755 --- a/zsh_aliases +++ b/zsh_aliases @@ -37,7 +37,8 @@ alias nmap-quick-plus="sudo nmap -sV -T4 -O -F --version-light " alias nmap-traceroute="sudo nmap -sP -PE -PS22,25,80 -PA21,23,80,3389 -PU -PO --traceroute " alias nmap-regular="nmap " alias nmap-comprehensive="sudo nmap -sS -sU -T4 -A -v -PE -PP -PS21,22,23,25,80,113,31339 -PA80,113,443,10042 -PO --script all " -alias nmap-osscan="sudo nmap -O -v --osscan-guess --fuzzy " +# Little "safer" scan as connecting to only HTTP and HTTPS ports doesn't look so attacking. Copy-paste to .zsh_custom and remove " -p 80,443" if you want to scan all ports which nmap scans by default. +alias nmap-osscan="sudo nmap -p 80,443 -O -v --osscan-guess --fuzzy " alias ping="nping " alias ping6="nping -6" alias netcat="ncat "