Nmap
Last updated
Last updated
To fingerprint the hosts on example.com, you can use the nmap
tool. Here's how you can do it:
Install nmap
: If you don't have nmap
installed, you can download and install it from the official website (https://nmap.org/download.html).
Run the following command:
The -sV
option is used to determine the service and version information of the target hosts.
The -O
option is used to enable OS detection and fingerprinting.
Analyze the output: The output will show the IP addresses and hostnames of the targets, along with the detected open ports and the services running on them. You'll also see the OS fingerprint and version information.
You can use nmap
in combination with the subdomains enumerated by subfinder
to fingerprint the targets. Here's how you can do it:
Save the output of enumeration: Save the output of subfinder
to a file. For example:
Run the following command:
The -sV
option is used to determine the service and version information of the target hosts.
The -iL
option is used to specify a file containing a list of targets to scan.
To run all the nmap
scripts on the example.com domain, you can use the following command:
The -sC
option is used to enable the default set of scripts for vulnerability detection and service fingerprinting.
The -sV
option is used to determine the service and version information of the target hosts.
To detect Common Vulnerabilities and Exposures (CVEs) on the example.com domain using nmap
, you can use the following command:
The --script vuln
option is used to enable the nmap
vulnerability detection scripts.
The output of the command will show the IP addresses and hostnames of the targets, along with the detected open ports and the services running on them. You'll also see the results of the nmap
vulnerability detection scripts, including any CVEs or vulnerabilities that they detect.