From Discovery to Enumeration
The Strategic Pentester's Cheatsheet: From Discovery to Enumeration
Phase 1: Host Discovery (Finding Live Targets)
# Nmap (Recommended) # -PR: ARP Scan | -sn: "Ping Scan" (disables port scan) sudo nmap -sn -PR 192.168.1.0/24 -oA discovery_arp # arp-scan (Very Fast) sudo arp-scan -l
# Nmap (Recommended for flexibility) # -PS: TCP SYN to common ports | -PA: TCP ACK | -PU: UDP # This combination bypasses many simple firewall rules that block only ICMP. sudo nmap -sn -PS80,443 -PA22 -PU53 10.10.10.0/24 -oA discovery_standard # fping (Fast ICMP sweep) fping -a -g 10.10.10.0/24 2>/dev/null
# -Pn: Skips host discovery entirely and attempts to port scan every IP. # This is an Nmap flag, not a standalone tool. # Combine this with the scanning techniques in Phase 2.
Phase 2: Port Scanning (Mapping the Attack Surface)
Phase 3: Service-Specific Enumeration (Deep Dive)
Authentication & Directory Services
Remote Access & Management
File Transfer & Sharing
Web & Application Services (Expanded)
Databases
Core Network Services
Phase 4: Strategic Scans & Workflows
Last updated