Skip to content

Instantly share code, notes, and snippets.

@CanadianJeff
Created May 4, 2019 13:22
Show Gist options
  • Save CanadianJeff/c8c48e7acae30cb6e8f4b0948ba598c3 to your computer and use it in GitHub Desktop.
Save CanadianJeff/c8c48e7acae30cb6e8f4b0948ba598c3 to your computer and use it in GitHub Desktop.

Revisions

  1. CanadianJeff created this gist May 4, 2019.
    67 changes: 67 additions & 0 deletions scan_profile.usp
    Original file line number Diff line number Diff line change
    @@ -0,0 +1,67 @@
    [All TCP ports scan]
    command = nmap -sS -p 1-65535 -Pn
    description = Scan all ports on a host.

    [Common TCP connect scan]
    command = nmap -sT -p 17,19,21,22,23,25,26,37,53,80,88,110,113,123,135,137,138,139,143,443,444,445,548,554,843,993,995,1027,1030,1064,1080,1194,1221,1433,2082,2083,2084,2086,2087,2095,2096,3074,3306,3333,3389,3784,4899,5631,5800,5900,6665-6669,6697,8000,8080,8088,10000,17500,32764 -n -Pn -r
    description = Scan Common Used Ports

    [Common TCP syn scan]
    command = nmap -sS -p 17,19,21,22,23,25,26,37,53,80,88,110,113,123,135,137,138,139,143,443,444,445,548,554,843,993,995,1027,1030,1064,1080,1194,1221,1433,2082,2083,2084,2086,2087,2095,2096,3074,3306,3333,3389,3784,4899,5631,5800,5900,6665-6669,6697,8000,8080,8088,10000,17500,32764 -n -Pn -r
    description =

    [Common TCP version scan]
    command = nmap -sV -p 17,19,21,22,23,25,26,37,53,80,88,110,113,123,135,137,138,139,143,443,444,445,548,554,843,993,995,1027,1030,1064,1080,1194,1221,1433,2082,2083,2084,2086,2087,2095,2096,3074,3306,3333,3389,3784,4899,5631,5800,5900,6665-6669,6697,8000,8080,8088,10000,17500,32764 -n -Pn -r
    description =

    [Honeypot Version Demo]
    command = nmap -sV -p 1433,3306,4899,5900,8000,10000 -n -Pn -r
    description = showing honeypot versions

    [Intense scan]
    command = nmap -T4 -A -v
    description = An intense, comprehensive scan. The -A option enables OS detection (-O), version detection (-sV), script scanning (-sC), and traceroute (--traceroute). Without root privileges only version detection and script scanning are run. This is considered an intrusive scan.

    [Intense scan plus UDP]
    command = nmap -sS -sU -T4 -A -v
    description = Does OS detection (-O), version detection (-sV), script scanning (-sC), and traceroute (--traceroute) in addition to scanning TCP and UDP ports.

    [Intense scan, all TCP ports]
    command = nmap -p 1-65535 -T4 -A -v
    description = Scans all TCP ports, then does OS detection (-O), version detection (-sV), script scanning (-sC), and traceroute (--traceroute).

    [Intense scan, no ping]
    command = nmap -T4 -A -v -Pn
    description = Does an intense scan without checking to see if targets are up first. This can be useful when a target seems to ignore the usual host discovery probes.

    [Ping scan]
    command = nmap -sn
    description = This scan only finds which targets are up and does not port scan them.

    [Quick scan]
    command = nmap -T4 -F
    description = This scan is faster than a normal scan because it uses the aggressive timing template and scans fewer ports.

    [Quick scan plus]
    command = nmap -sV -T4 -O -F --version-light
    description = A quick scan plus OS and version detection.

    [Quick traceroute]
    command = nmap -sn --traceroute
    description = Traces the paths to targets without doing a full port scan on them.

    [Random Telnet Scan (Show Open)]
    command = nmap -sS -p 23 -n -iR 10 -Pn --open
    description = Scan Random Hosts For Telnet

    [Regular scan]
    command = nmap
    description = A basic port scan with no extra options.

    [Slow comprehensive scan]
    command = nmap -sS -sU -T4 -A -v -PE -PS80,443 -PA3389 -PP -PU40125 -PY --source-port 53 --script "default or (discovery and safe)"
    description = This is a comprehensive, slow scan. Every TCP and UDP port is scanned. OS detection (-O), version detection (-sV), script scanning (-sC), and traceroute (--traceroute) are all enabled. Many probes are sent for host discovery. This is a highly intrusive scan.

    [Telnet Internet Random]
    command = nmap -sS -p 23 -n -iR 100 -Pn --open
    description = Scan Random IPv4 For Telnet Open