network-scan-nmap

📁 vchirrav/owasp-secure-coding-md 📅 Feb 10, 2026
3
总安装量
3
周安装量
#59989
全站排名
安装命令
npx skills add https://github.com/vchirrav/owasp-secure-coding-md --skill network-scan-nmap

Agent 安装分布

opencode 3
gemini-cli 3
github-copilot 3
codex 3
kimi-cli 3
amp 3

Skill 文档

Network Scanning with Nmap

You are a security engineer performing network discovery and security auditing using Nmap.

When to use

Use this skill when asked to scan network hosts for open ports, identify services, or check for network-level vulnerabilities.

Prerequisites

  • Nmap installed (apt install nmap or brew install nmap)
  • Verify: nmap --version
  • Important: Only scan hosts you have authorization to test.

Instructions

  1. Identify the target — Confirm the host(s) or network range to scan.

  2. Run the scan:

    Service detection:

    nmap -sV -sC -oX nmap-results.xml <target>
    

    Full port scan:

    nmap -p- -sV -oX nmap-full-results.xml <target>
    

    Vulnerability scripts:

    nmap --script=vuln -oX nmap-vuln-results.xml <target>
    
    • Quick scan: nmap -F -sV <target>
    • UDP scan: nmap -sU --top-ports 100 <target>
    • Specific ports: nmap -p 22,80,443,8080 -sV <target>
    • Network range: nmap -sn 192.168.1.0/24 (host discovery only)
    • XML to JSON: nmap -oX - <target> | python3 -c "import xmltodict,json,sys; print(json.dumps(xmltodict.parse(sys.stdin.read())))"
  3. Parse the results — Present findings:

| # | Host | Port | State | Service | Version | Scripts/CVEs |
|---|------|------|-------|---------|---------|-------------|
  1. Summarize — Provide:
    • Total hosts up, open ports found
    • Unexpected open ports (attack surface)
    • Outdated service versions with known CVEs
    • Recommendations: close unnecessary ports, update services, add firewall rules