Active Reconnaissance
Methodology Framework
2
3
4
Service enumeration
# Service/version + default scripts (lightweight)
nmap -sV -sC <host>
# Web enumeration (titles, server headers)
nmap -p80,443 -sV --script=http-title,http-server-header <host>
gobuster dir -u http://<host> -w /usr/share/wordlists/dirb/common.txt
# SMB enumeration
nmap -p445 -sV --script=smb-os-discovery,smb-security-mode <host>
smbclient -L //<host> -N
enum4linux -a <host>
# LDAP / DC checks (only when DCs are in-scope)
ldapsearch -x -h <host> -s base namingcontexts
nmap -p88 -sV --script=krb5-enum-users <host>5
Scenario presets (copyable)
# External assessment (authorized)
nmap -T3 --top-ports 100 --open -sV target.com
# Internal baseline (LAN)
nmap -sn 192.168.1.0/24
nmap --top-ports 1000 -iL live_hosts.txt -sV
# Web application focus
nmap -p80,443 -sV --script=http-enum,http-title target.com
gobuster dir -u http://target.com -w common.txLast updated
Was this helpful?