#watch -n 10 "nmap -e wlan0 -Pn -T5 -S 192.168.0.253 192.168.0.251"
-e wlan0: Specify the network adapter sending the packets.
-Pn: There is no need to PING before launching the scan.
-T5: The fastest rate.
-S 192.168.0.253: Spoofing the packet source as 192.168.0.253.
192.168.0.251: The target.
The nmap scan would be repeatedly launched every 10 seconds by using the watch command.
Example #2 Command:
#watch -n 0.1 "nmap -e eth0 -T5 -p443 -D 12.0.0.1,12.0.0.2,12.0.0.3,RND,ME,RND 10.10.77.245"
-e eth0: Specify the network adapter sending the packets.
-T5: The fastest rate.
-T5: The fastest rate.
-p443: Scan TCP443 port of the target.
-D 12.0.0.1,12.0.0.2,12.0.0.3,RND,ME,RND: Spoofing the packet sources as 12.0.0.1, 12.0.0.2, 12.0.0.3, a random IP, my own IP, and another random IP.
-D 12.0.0.1,12.0.0.2,12.0.0.3,RND,ME,RND: Spoofing the packet sources as 12.0.0.1, 12.0.0.2, 12.0.0.3, a random IP, my own IP, and another random IP.
10.10.77.245: The target.
The nmap scan would be repeatedly launched every 0.1 second by using the watch command.
The nmap scan would be repeatedly launched every 0.1 second by using the watch command.
No comments:
Post a Comment