# Basic Two level Recon for exam1) nmap -p- -T5 --min-rate=1000 10.10.10.192 -oG fkclai.nmap2) nmap -p $(grep -Eo '[0-9]{1,5}/open' fkclai.nmap | cut -d '/' -f 1 | tr -s '\n' ',') -sC -sV 10.10.10.192 -o nmap-result.txt# Enumerate subnetnmap -sn 10.11.1.1/24# Fast simple scannmap -sS 10.11.1.111# Full complete slow scan with outputnmap -v -sT -A -T4 -p- -Pn --script vuln -oA full 10.11.1.111# Scan for UDPnmap 10.11.1.111 -sU
# Netdiscovernetdiscover -i eth0netdiscover -r 10.11.1.1/24# Nmapnmap -sn 10.11.1.1/24nmap -sn 10.11.1.1-253nmap -sn 10.11.1.*# NetBiosnbtscan -r 10.11.1.1/24
tcpdump -i eth0tcpdump -c -i eth0tcpdump -A -i eth0tcpdump -w 0001.pcap -i eth0tcpdump -r 0001.pcaptcpdump -n -i eth0tcpdump -i eth0 port 22tcpdump -i eth0 -src 172.21.10.Xtcpdump -i eth0 -dst 172.21.10.X