Nmap basics pt3

nmap -v 95.111.13.111 -sU -p 1000-1200 Starting Nmap 7.70 ( https://nmap.org ) at 2018-09-09 07:24 CDT Initiating Ping Scan at 07:24 Scanning 95.111.13.111 [4 ports] Completed Ping Scan at 07:24, 0.03s elapsed (1 total hosts) Initiating UDP Scan at 07:24 Scanning d1m0.com (95.111.13.111) [201 ports] Discovered open port 1194/udp on 95.111.13.111 Not shown: 200 closed …

Continue reading ‘Nmap basics pt3’ »

Nmap scaning basics pt2

TARGET SPECIFICATION: Can pass hostnames, IP addresses, networks, etc. Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254 -iL : Input from list of hosts/networks -iR : Choose random targets –exclude : Exclude hosts/networks –excludefile : Exclude list from file HOST DISCOVERY: -sL: List Scan – simply list targets to scan -sn: Ping Scan – disable port scan -Pn: …

Continue reading ‘Nmap scaning basics pt2’ »

Wifi hacking. reaver way.

Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf. start reaver -i mon0 -b 10:FE:ED:0B:6A:A6 -vv and wait.