Update README.md
This commit is contained in:
parent
55faa3b5e8
commit
7bc53594b0
@ -113,11 +113,11 @@ This tool enum and search possible misconfigurations (known vulns, user, process
|
||||
-t Automatic network scan & Internet conectivity checks - This option writes to files
|
||||
-r Enable Regexes (this can take from some mins to hours)
|
||||
-P Indicate a password that will be used to run 'sudo -l' and to bruteforce other users accounts via 'su'
|
||||
-D Debug mode
|
||||
-D Debug mode
|
||||
|
||||
Network recon:
|
||||
-t Automatic network scan & Internet conectivity checks - This option writes to files
|
||||
-d <IP/NETMASK> Discover hosts using fping or ping. Ex: -d 192.168.0.1/24
|
||||
-d <IP/NETMASK> Discover hosts using fping or ping. Ex: -d 192.168.0.1/24
|
||||
-p <PORT(s)> -d <IP/NETMASK> Discover hosts looking for TCP open ports (via nc). By default ports 22,80,443,445,3389 and another one indicated by you will be scanned (select 22 if you don't want to add more). You can also add a list of ports. Ex: -d 192.168.0.1/24 -p 53,139
|
||||
-i <IP> [-p <PORT(s)>] Scan an IP using nc. By default (no -p), top1000 of nmap will be scanned, but you can select a list of ports instead. Ex: -i 127.0.0.1 -p 53,80,443,8000,8080
|
||||
Notice that if you specify some network scan (options -d/-p/-i but NOT -t), no PE check will be performed
|
||||
|
Loading…
Reference in New Issue
Block a user