Scanning
AutoRecon
autorecon -ct 2 -cs 2 -vv -o outputdir 192.168.1.100 192.168.1.1/30 localhost
autorecon 10.200.97.200
autorecon -t targets.txt --only-scans-dir
# With vhost enumeration for known hostname
autorecon TARGET_IP --vhost-enum.hostname TARGET.htb -v
# Specify directory busting tool
autorecon TARGET_IP --dirbuster.tool feroxbuster -v
# Combined example
autorecon 10.129.237.241 --vhost-enum.hostname planning.htb --dirbuster.tool feroxbuster -vFlag
Description
General Enumeration Figure out the Hosts and Services Running
NetDiscover
Nmap
Ping Scan -sn Option
TCP Connect Scan
TCP SYN Scan
UDP Port Scanning
Fingerprint Services
Scanning port ranges with Nmap
NSE
Detecting Linux Version from nmap SSH output

Vulnerability Scanning
Last updated