![Germán Fernández on Twitter: "I wrote a quick Nmap script to scan for servers potentially vulnerable to #ProxyNotShell (based on Microsoft's recommended URL blocking rule) I hope it can be useful for Germán Fernández on Twitter: "I wrote a quick Nmap script to scan for servers potentially vulnerable to #ProxyNotShell (based on Microsoft's recommended URL blocking rule) I hope it can be useful for](https://pbs.twimg.com/media/FeC-q8yWYAAFiKc.png)
Germán Fernández on Twitter: "I wrote a quick Nmap script to scan for servers potentially vulnerable to #ProxyNotShell (based on Microsoft's recommended URL blocking rule) I hope it can be useful for
![Nmap cheat sheet: From discovery to exploits, Part 3: Gathering additional information about host and network | Infosec Resources Nmap cheat sheet: From discovery to exploits, Part 3: Gathering additional information about host and network | Infosec Resources](https://resources.infosecinstitute.com/wp-content/uploads/072214_1408_NmapCheatSh1.png)
Nmap cheat sheet: From discovery to exploits, Part 3: Gathering additional information about host and network | Infosec Resources
![Nmap Tutorial For Beginners | How to Scan Your Network Using Nmap | Ethical Hacking Tool | Edureka - YouTube Nmap Tutorial For Beginners | How to Scan Your Network Using Nmap | Ethical Hacking Tool | Edureka - YouTube](https://i.ytimg.com/vi/IoIsTrKrl-0/maxresdefault.jpg)