zsh_aliases: nmap-osscan: scan only 80 and 443 to look less attacking. (See full commit message.)

I think that it looks less attacking to scan only widely used HTTP and HTTPS ports
instead of scanning all of the 1000 ports which nmap scans by default. If someone
wants to scan them, see comment above this alias in zsh_aliases.
This commit is contained in:
Mika Suomalainen 2011-10-26 15:12:58 +03:00
parent 42fe0729b2
commit 054a604db0

View File

@ -37,7 +37,8 @@ alias nmap-quick-plus="sudo nmap -sV -T4 -O -F --version-light "
alias nmap-traceroute="sudo nmap -sP -PE -PS22,25,80 -PA21,23,80,3389 -PU -PO --traceroute " alias nmap-traceroute="sudo nmap -sP -PE -PS22,25,80 -PA21,23,80,3389 -PU -PO --traceroute "
alias nmap-regular="nmap " alias nmap-regular="nmap "
alias nmap-comprehensive="sudo nmap -sS -sU -T4 -A -v -PE -PP -PS21,22,23,25,80,113,31339 -PA80,113,443,10042 -PO --script all " alias nmap-comprehensive="sudo nmap -sS -sU -T4 -A -v -PE -PP -PS21,22,23,25,80,113,31339 -PA80,113,443,10042 -PO --script all "
alias nmap-osscan="sudo nmap -O -v --osscan-guess --fuzzy " # Little "safer" scan as connecting to only HTTP and HTTPS ports doesn't look so attacking. Copy-paste to .zsh_custom and remove " -p 80,443" if you want to scan all ports which nmap scans by default.
alias nmap-osscan="sudo nmap -p 80,443 -O -v --osscan-guess --fuzzy "
alias ping="nping " alias ping="nping "
alias ping6="nping -6" alias ping6="nping -6"
alias netcat="ncat " alias netcat="ncat "