Initial Scanning Methodology

When doing my initial scans on a machine I use two tools. These are:

RustScan Usage

I use RustScan as it is very quick to return open ports. I use the -g flag when running it so that the ports are returned in an array that I can copy into an nmap scan:

rustscan -g -a <IP-ADDR> --ulimit 5000

Nmap Usage

I run nmap passing the ports found by RustScan in the -p flag. I then add -sC for default scripts, -sV to probe ports and get service/version information, and I add -oA to output the scan results into three different file formats. An example scan would look like this:

nmap -p 21,22,80 -sC -sV -oA Nmap/rustports <IP-ADDR>