All Posts programming naabu: port scanner

naabu: port scanner

· 206 words · 1 minute read

naabu is a fast port scanner written in Go with a focus on reliability and simplicity.

Note: Some features are only activated when naabu is run with root privileges such as SYN scan.

More information: https://github.com/projectdiscovery/naabu .

Run a SYN scan against default (top 100) ports of remote host:

sudo naabu -host host

Display available network interfaces and public IP address of the local host:

naabu -interface-list

Scan all ports of the remote host (CONNECT scan without sudo):

naabu -p - -host host

Scan the top 1000 ports of the remote host:

naabu -top-ports 1000 -host host

Scan TCP ports 80, 443 and UDP port 53 of the remote host:

naabu -p 80,443,u:53 -host host

Show CDN type the remote host is using, if any:

naabu -p 80,443 -cdn -host host

Run nmap from naabu for additional functionalities (nmap must be installed):

sudo naabu -v -host host -nmap-cli 'nmap -v -T5 -sC'

I hope you enjoyed reading this post as much as I enjoyed writing it. If you know a person who can benefit from this information, send them a link of this post. If you want to get notified about new posts, follow me on YouTube , Twitter (x) , LinkedIn , and GitHub .