recon-nmap
Ejecutar reconocimiento de red con Nmap
El reconocimiento de red es esencial para las evaluaciones de seguridad pero requiere flujos de trabajo estructurados para garantizar la exhaustividad y el cumplimiento. Esta habilidad proporciona comandos Nmap listos para usar, listas de verificación de flujos de trabajo y plantillas de integración para escaneo de puertos, enumeración de servicios y detección de vulnerabilidades.
스킬 ZIP 다운로드
Claude에서 업로드
설정 → 기능 → 스킬 → 스킬 업로드로 이동
토글을 켜고 사용 시작
테스트해 보기
"recon-nmap" 사용 중입니다. Scan 192.168.1.0/24 for live hosts and open ports
예상 결과:
- Host Discovery Results:
- - 192.168.1.10: Status: Up
- - 192.168.1.15: Status: Up
- - 192.168.1.20: Status: Up
- Port Scan Summary:
- - 192.168.1.10: Ports 22 (SSH), 80 (HTTP), 443 (HTTPS) - Open
- - 192.168.1.15: Ports 22 (SSH), 3389 (RDP) - Open
- Service Detection:
- - SSH: OpenSSH 8.4p1 on 192.168.1.10
- - HTTP: Apache 2.4.41 on 192.168.1.10
"recon-nmap" 사용 중입니다. Run vulnerability detection on a target
예상 결과:
- Vulnerability Scan Results:
- - 192.168.1.10:443 - ssl-heartbleed: NOT VULNERABLE
- - 192.168.1.10:445 - smb-vuln-ms17-010: VULNERABLE (Critical)
- - 192.168.1.15:22 - ssh-brute: No weak credentials detected
- Recommendations:
- - Apply MS17-010 patch to 192.168.1.10 immediately
보안 감사
낮은 위험Documentation-only skill providing Nmap command examples and templates for authorized security testing. All 395 static findings are false positives - the scanner detected patterns in documentation describing legitimate security tooling, but the skill contains no executable code that performs scanning, network access, or credential handling.
위험 요인
⚙️ 외부 명령어 (113)
🌐 네트워크 접근 (38)
🔑 환경 변수 (27)
⚡ 스크립트 포함 (2)
품질 점수
만들 수 있는 것
Pruebas de penetración autorizadas
Conduct reconnaissance network during authorized penetration tests with comprehensive Nmap workflows and compliance documentation
Integración de seguridad en CI/CD
Integrate Nmap scanning into CI/CD pipelines using provided GitHub Actions templates for continuous security validation
Evaluaciones de seguridad de red
Perform compliance scanning to validate network segmentation and identify security gaps against security frameworks
이 프롬프트를 사용해 보세요
Use Nmap to discover live hosts on network 192.168.1.0/24 using ping sweep and output results to live_hosts.txt
Run Nmap service version detection (-sV) on all hosts in live_hosts.txt and save results to service_scan
Execute NSE vulnerability scripts against targets to check for MS17-010, Heartbleed, and SSL vulnerabilities
Run comprehensive Nmap reconnaissance including host discovery, full port scan, OS detection, and vulnerability scripts on 10.0.1.0/24
모범 사례
- Always verify written authorization before scanning any network or system
- Start with host discovery before port scanning to reduce scan time and network impact
- Use rate limiting (--max-rate) and timing templates (-T1 to -T4) to avoid overwhelming targets
피하기
- Running aggressive scans (-T5) without rate limiting on production networks
- Scanning without first identifying the scope and obtaining proper authorization
- Failing to document scan parameters and results for compliance and incident response