Network Enumeration
00. Networking Basics
## ------------------| Loopback Alternatives
ping localhost
ping 127.0.0.1
ping 127.1
ping 0x7F000001
ping 0x7f01
ping 2130706433
ping β β‘β¦.βͺ.βͺ.βͺ
ping 017700000001
ping 0177.0000.0000.0001
ping 00000177.00000000.00000000.00000001IPV 6
## ------------------| Common
fe80::c2d9:184f:9f41:3c8d <==> fe80:0000:0000:0000:c2d9:184f:9f41:3c8d
## ------------------| Subneting
fe80::/10 - Unique Link-Local (169.254.4.x)
## fe80:0000:0000:0000:0000:0000:0000:0000
## febf:ffff:ffff:ffff:ffff:ffff:ffff:ffff (mask)
fc00::/7 - Unique Local-Unicast (10.x.x.x, 172.16.x.x, 192.168.x.x)
## fc00:0000:0000:0000:0000:0000:0000:0000
## fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff (mask)
2000::/3 - Global Unicast
## 3fff:ffff:ffff:ffff:ffff:ffff:ffff:ffff (mask)
FF02::1 - Multicast All Nodes
FF02::2 - Multicast Router NodesCalculate
Link-LocalIPV6 Address Using Mac

Enumerate Network by ping multicast |
atk6-alive6
ICMP Codes

01. Nmap
Nmap debug mode
Host discovery
Scan all TCP open ports
scan TCP(All) + UDP
Get all open port to variable
Service scan for only selected open port (using above)
Optimizing UDP scan
Fast UDP scan for common ports
AV / Firewall bypass
Common usage
Scripting Engine (NSE)
Tune up performance
If you want to install
nmap
Pause and Resume an nmap scan
Use nmap static binary with scripts
02. Hping
03. Tcpdump
Basic usage | Always use
tcpdumpwithsudo
Isolate TCP Flags
04. Other
Port scan using
netcat
Scan live hosts
using bash
Scan live ports
using bash
05. Advance
05.1 Send packet [python]
05.2 Wireshark
Create NTML hash using wireshark


05.3 Zeek
Last updated