Posts tagged nmap

Security Assessment and Pentest tools Cheat Sheets


Got from my old Bookmarks ,below are some useful Cheat Sheets ,let me know if u found any other cheat sheets i will update the post


Backtrack 4
misc tools
Metasploit Meterpreter

Oracle Security

SQl Injection

Microsoft SQL,Sybase,MySQL,Oracle,PostgreSQL,DB2,IngresBypass SQL Injection Filters
Packetlife Cheatsheets

Ed Skoudis’ Pentest Cheatsheets

Windows commandline tools
Netcat Cheat Sheet
Useful Attack Tools, Metasploit commands, HPing, FGDump

Reverse Engineering Malware Cheat Sheet

Security Archiecture Cheat Sheet for Internet Applications

CEH cheatsheets from Mindcert

Network Scanning Using Nmap Through Proxy server


Many times while Penetration testing from the Client Network i have came across a situation in which client has an internal proxy server for accessing everything .
I had to do a network scanning for WAN devices using   NMAP through a proxy server and client  was using ISA server as their proxy server  to achieve there is a  tool knows as ProxyChains which  allows to run any program through HTTP or SOCKS proxy

how to install and configure proxychains

root@bt:~#apt-get install proxychains  (if ur using any debian distro)
root@bt:~#nano etc/proxychains.conf
Than you will see the proxylist where we can add our proxies:

# add proxy here …
# meanwile
# defaults set to “tor”
socks4 9050

now add ur ISA server proxy server IP like below

# add proxy here …
# meanwile
# defaults set to “tor” 8080—>ISA server IP
Socks4 9050

save and exit

root@bt:~# proxychains nmap -sV WANIP

Go to Top