Skip to content

Ignitetechnologies/Nmap-For-Pentester

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

17 Commits
Β 
Β 

Repository files navigation

πŸ“‘ Nmap for Pentester

A practical Nmap cheat sheet and reference guide designed for penetration testers, red teamers, and cybersecurity learners to perform efficient network reconnaissance and vulnerability discovery using Nmap.

🌐 Connect With Us

πŸ”΅ Telegram – Join Channel
⚫ Twitter/X – Follow Us
🟣 Discord – Join Server
πŸ’Ό LinkedIn – Follow HackingArticles

πŸŽ“ Training Program

πŸš€ Join Our Cybersecurity Training Program

Hands-on training in Penetration Testing, Red Teaming, and Cybersecurity.

1## πŸ“‘ Nmap for Pentesters

# Topic Description Article
1 πŸ” Host Discovery Discover live hosts in a network using Nmap host discovery techniques Read Article
2 πŸ“„ Output Format Scan Save and analyze scan results using different Nmap output formats Read Article
3 πŸ“¦ Understanding Nmap Packet Trace Analyze packet-level communication during Nmap scans Read Article
4 ⏱️ Nmap Scan with Timing Parameters Control scan speed using Nmap timing templates Read Article
5 🧩 Nmap Scans using Hex Value Flags Perform custom scans using TCP flag values in hexadecimal Read Article
6 πŸ•΅οΈ Forensic Investigation of Nmap Scan Analyze Nmap scans using Wireshark for forensic investigation Read Article
7 ⏳ Timing Scan Perform stealthy scans by adjusting timing parameters Read Article
8 πŸ“‘ Ping Scan Discover live hosts using ICMP and ARP ping scans Read Article
9 πŸšͺ Port Status Understand open, closed, and filtered port states Read Article
10 🚨 Detect Nmap Scan using Snort Detect Nmap scanning activity using Snort IDS Read Article
11 πŸ”₯ Firewall Scan (Part 2) Advanced techniques for bypassing firewall filters using Nmap Read Article
12 πŸ”₯ Firewall Scan (Part 1) Introduction to firewall evasion scanning techniques Read Article
13 πŸ“Š Understanding Nmap Scan with Wireshark Monitor and analyze Nmap scans using Wireshark Read Article
14 πŸ”‘ Password Cracking with Nmap Use Nmap scripts to perform password brute force attacks Read Article
15 πŸ›‘οΈ Vulnerability Scan Detect vulnerabilities using Nmap NSE scripts Read Article
16 πŸ“˜ Nmap Beginner Guide Complete beginner guide for network scanning using Nmap Read Article
17 πŸ—„οΈ MSSQL Penetration Testing Exploit and enumerate MSSQL services using Nmap Read Article
18 πŸ—„οΈ MySQL Penetration Testing Perform MySQL enumeration and attacks using Nmap Read Article

cheatsheet

About

This cheatsheet was created to assist Red Teamers and Penetration Testers in hunting down vulnerabilities using "Nmap."

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages