Skip to content

Networking Reconnaisance

Lee Dale edited this page Jun 2, 2023 · 4 revisions

Tools

nmap -sS 172.27.0.0/20 Scan subnet for hosts

nmap -sV 192.168.86.150 Look for open ports on host

netstat -ab Look for listening / established connections

For blocked ICMP can use traceroute.

nslookup www.google.com Lookup domain information

tcpdump -i eth0 "src host 10.1.0.100 and (dst port 53 or dst port 80)" Sniff packets on eth0 interface with filter

Packet capture analysis

Packet injection / man in the middle attacks

Replay TCP from pcap