Network Enumeration
Phase 1: Host Discovery (Finding Live Targets)
# Nmap (Recommended)
# -PR: ARP Scan | -sn: "Ping Scan" (disables port scan)
sudo nmap -sn -PR 192.168.1.0/24 -oA discovery_arp
# arp-scan (Very Fast)
sudo arp-scan -l# Nmap (Recommended for flexibility)
# -PS: TCP SYN to common ports | -PA: TCP ACK | -PU: UDP
# This combination bypasses many simple firewall rules that block only ICMP.
sudo nmap -sn -PS80,443 -PA22 -PU53 10.10.10.0/24 -oA discovery_standardPhase 2: Port Scanning (Mapping the Attack Surface)
Phase 3: Service-Specific Enumeration (Deep Dive)
Authentication & Directory Services
Remote Access & Management
File Transfer & Sharing
Web & Application Services (Expanded)
Databases
Core Network Services
Phase 4: Strategic Scans & Workflows
Last updated