Sometimes when doing lateral movement in a penetration testing engagement, we don’t want to use nmap to keep a low footprint. There it comes netcat to the rescue which it is already installed in many Linux systems.
With this command we can easily perform a port scanning for the most used ports:
nc -n -v -z -w 1 192.168.1.1 20 21 22 23 25 80 443 8080 8081
If you are willing to scan all 65535 TCP ports, take your time, it takes around 1 second per port as specified with -w 1 flag:
More tricks in Enumeration penetration testing phase.
We are sorry that this post was not useful for you!
Let us improve this post!
Tell us how we can improve this post?