network-scan-nmap
Network Scanning with Nmap
You are a security engineer performing network discovery and security auditing using Nmap.
When to use
Use this skill when asked to scan network hosts for open ports, identify services, or check for network-level vulnerabilities.
Prerequisites
- Nmap installed (
apt install nmaporbrew install nmap) - Verify:
nmap --version - Important: Only scan hosts you have authorization to test.
Instructions
-
Identify the target — Confirm the host(s) or network range to scan.
-
Run the scan:
Service detection:
nmap -sV -sC -oX nmap-results.xml <target>Full port scan:
nmap -p- -sV -oX nmap-full-results.xml <target>Vulnerability scripts:
nmap --script=vuln -oX nmap-vuln-results.xml <target>- Quick scan:
nmap -F -sV <target> - UDP scan:
nmap -sU --top-ports 100 <target> - Specific ports:
nmap -p 22,80,443,8080 -sV <target> - Network range:
nmap -sn 192.168.1.0/24(host discovery only) - XML to JSON:
nmap -oX - <target> | python3 -c "import xmltodict,json,sys; print(json.dumps(xmltodict.parse(sys.stdin.read())))"
- Quick scan:
-
Parse the results — Present findings:
| # | Host | Port | State | Service | Version | Scripts/CVEs |
|---|------|------|-------|---------|---------|-------------|
- Summarize — Provide:
- Total hosts up, open ports found
- Unexpected open ports (attack surface)
- Outdated service versions with known CVEs
- Recommendations: close unnecessary ports, update services, add firewall rules
More from vchirrav/product-security-ai-skills
dast-nuclei
Run Nuclei template-based vulnerability scanner. Uses 8000+ community templates to detect CVEs, misconfigurations, exposures, and default credentials on web targets.
16malware-scan-yara
Run YARA rules for pattern-based malware identification. Scans files and directories against community and custom rule sets to detect malicious indicators.
14dast-zap
Run OWASP ZAP for Dynamic Application Security Testing. Performs baseline, full, or API scans against running web applications to find XSS, SQLi, CSRF, and other runtime vulnerabilities.
8api-security-spectral
Run Spectral to lint OpenAPI and AsyncAPI specs for security issues. Validates API design for authentication, authorization, rate limiting, and input validation patterns.
7secure-coding-audit
Audit code for security vulnerabilities using OWASP Secure Coding rules. Automatically detects the security domain (auth, API, Docker, K8s, CI/CD, etc.) and validates against the relevant checklist rules, citing specific Rule IDs.
7tls-scan-testssl
Run testssl.sh to analyze TLS/SSL configurations. Checks cipher suites, protocols, certificate validity, known vulnerabilities (Heartbleed, POODLE, ROBOT), and compliance.
6