I see too many people using a full nmap scan on release day which takes ages. Often times first blood is claimed by the pros while people still have scans running.
Using masscan, you can scan all TCP and UDP ports in roughly 2-3 minutes.
masscan -p1-65535,U:1-65535 10.10.10.x --rate=1000 -e tun0
-p1-65535,U:1-65535
tells masscan to scan all TCP/UDP ports
--rate=1000
scan rate = 1000 packets per second
-e tun0
tells masscan to listen on the VPN network interface for responses
Once you have a list of valid ports from masscan, you can feed them to nmap for service enumeration. For example, if masscan finds ports 80, 443 and 3306 open, the nmap command would be:
nmap -sV -p80,443,3306 10.10.10.x
That’s it! Waaaaaay faster than a regular nmap scan at T5. Just note that you should not go above 1000pps with masscan, as it can miss ports if it is set too high. If you find masscan is missing ports, try lowering your scan rate to 200-300. This generally is caused by a low quality or low speed connection to the VPN.