Network Recon & Host Discovery
This cheatsheet serves as the foundational checklist for network-level enumeration. It is structured to scale from localized host discovery sweeps to targeted, protocol-specific vulnerability scanning.
Host Discovery (Network Sweeps)
Before hitting specific ports, identify live assets on the subnet. Layer 2 (ARP) is preferred for local networks as it cannot be blocked by host firewalls, while Layer 3 (ICMP) is necessary for routed networks.
Nmap Ping Sweep (Disables port scan, fast)
fping (Extremely fast, outputs only alive IP addresses)
netdiscover (Active/passive ARP recon)
Port Scanning
Once live hosts are identified, enumerate open services.
Efficiency
For CTF environments, always use --min-rate=1000 (or higher) combined with -p- to scan all 65,535 ports quickly. In real-world pentests, this aggression level will drop packets or trigger IPS/IDS appliances.
TCP Scanning Strategies
SYN Scan, Service Versioning, All Ports, High Rate
Service Versioning, Default Scripts, OS Detection, All Ports
Aggressive mode (-A), skips host discovery (-Pn), runs vuln scripts, saves to file
UDP Scanning
Important
UDP scanning is notoriously slow and unreliable because open UDP ports often do not respond. Only scan common UDP ports rather than the full 65k range to save time.