Passive nmap (smap)
Port scanning without touching your target
SMAP
Filtering results to gain further insight
Last updated
Was this helpful?
Port scanning without touching your target
Last updated
Was this helpful?
Was this helpful?
python3 fire.py --command create --url https://internetdb.shodan.io/func Query(ip string) []byte {
url := "https://<randomstring>.execute-api.eu-west-2.amazonaws.com/fireprox/" + ip
req, err := http.NewRequest("GET", url, nil)
resp, err := client.Do(req)grep -Po '(\d*)(?=/open)' output.gnmap | sort -u > openport.list;
for PORT in $(cat openport.list); do awk -v port="${PORT}" "/${PORT}\/open/ {print \$2}" output.gnmap >> Live_${PORT}; done;cat ip-ranges.gnmap| grep -Po '(\d*)(?=/open)' | sort -u | while read PORT ; do cat ip-ranges.gnmap | awk -v port="${PORT}" "/${PORT}\/open/ {print \$2}" >> Live_${PORT}; done