dnmap

The dnmap is our favorite tool. dnmap is line nmap, but the big advantage of dnmap is that you can nmap a lots of client at once

[LETS MAKE IT WORK]

#1) Open terminal & type:
assault@kalivm:~$ sudo vim /home/tux/Documents/dnmap_values.txt
*In that point we gonna create a TXT file through a VIM editor*

*Now let’s enter the values that we want*
*The values will be*
nmap -sS
nmap -p
nmap -v
nmap -n
nmap -oA

*That’s mean*
nmap -sS = TCP SYN/Connent () /ACK/Windows/Maimon scans
nmap -p = Port
nmap -v = Increase verbosity level
nmap -n = Never do DNS resolution
nmap -oA = Output in the three major formats at once

*Now, inside the VIM editor, let’s hit i key, and insert the values 1 by 1 – Like this*

dn-a1

 

*Now, after you’ve entered the values inside the VIM editor, hit ESC & type :wq!*
*The :wq! means, writeout and close the file immediately*
*Like this*

dn-b

*You will not be able to type :wq! if you will not hit ESC in first*

*Now, we have a txt file with the values under /Documents folder*

#2) Open another terminal tab & type:
assault@kalivm:~$ cd ~/Documents
assault@kalivm:~/Documents$ ls
*Now, locate the dnmap_values.txt file & type*
assault@kalivm:~/Documents$ sudo dnmap_server -f dnmap_values.txt
*The -f means Nmap command file*
*And we will get this output*

dn-c

 

#3) Open another terminal tab & type
assault@kalivm:~$ sudo sudo dnmap_client -s 192.168.50.15
*The -s means, second, the IP 192.168.50.15 is the hacker IP*
*We will get this output*

dn-f

*Take a look at the dnmap_client output up here, the dnmap is executing the commands that we’ve entered into the VIM editor from before*

 

*Meanwhile, what’s going on at the dnmap_server tab? check this out*

dn-e

 

*We’re starting to receive some data*

 

ENJOY! 🙂

 

Here is an example by Gamer Forever