Required Tools prior to making reports:
Any version of nmap installed that supports the -oA (output all formats).
The way I typically run nmap is as follows:
bash# nmap -sX -sC -Avvv --top-ports 50 -oA <prefixfilename> x.x.x.x/x
Make sure you have permission to write to — if not you could write to /tmp
The main things I would advise without getting into nmap details here:
Keep in mind if the host your nmaping is NOT responding to ICMP :
It is a good thing to ask ChatGPT why this is. Why nmaping 65,000 ports if the host replys with ICMP takes < 5 m, but if the host doesnt reply to ping, it could be 72 hours, and not have exact reliability. This is why i suggest using — top-ports <N> Keep it under 50. In addition
- sX — “Xmas Scan” — This used to be stealth back in the day with half open connection, but its just a normal TCP scan now
- sC — nmap nse — utilitize default nmap NSE scripts (google it)
- Avvv — Verbose Grab banners etc
- oA — Write out the gnmap , xml and another format.
Time to rock and roll, load up either GUI zenmap or just root nmap —
Once the scan finishes locate the .xml file created (you can always ls -latr, which shows you the last modified files at the bottom).
BTW: This is what you should see on your web server’s nothing less, nothing more — port 80 and 443. Output files in /tmp
Verify the .xml file is structurally correct, at times i see a random character in the top.