Fix raw-socket "Operation not permitted" without --privileged
Least-privilege setup for running Nmap, MASSCAN, or ZMap inside Docker/Podman/Kubernetes. Solves "requires root privileges" and "Operation not permitted" failures without reaching for --privileged. Includes fallbacks when raw sockets are unavailable.
Create a skill called "Rootless Scanner Runner". Inputs I will provide: - Target scope (CIDRs/hosts) - Allowed scan types (SYN vs TCP connect), and whether I'm allowed to run containers with NET_RAW/NET_ADMIN - Output directory path Task: 1) Decide whether raw sockets are required for my goal. 2) Generate the safest commands that meet the goal: - Prefer TCP connect (`nmap -sT`) when acceptable. - Use least-privilege caps (`--cap-add=NET_RAW` and only add `NET_ADMIN` if needed). - Always set conservative rate limits for high-speed tools. 3) Provide troubleshooting paths for the most common errors (Operation not permitted, requires root). 4) Output should include: commands to run, expected outputs, and a short "audit note" summarizing why these caps were required.
Many high-value scan modes (SYN scanning, OS detection, packet-capture workflows)
require raw sockets or interface capabilities. In hardened container runtimes those
capabilities are commonly dropped, so tools fail even when you are "root" inside the
container.
This recipe gives you a decision tree:
are unavailable
`docker run --rm -it --cap-add=NET_RAW --cap-add=NET_ADMIN instrumentisto/nmap -sS -Pn -n -p 1-1000
`docker run --rm -it instrumentisto/nmap -sT -Pn -n -p 1-1000
`docker run --rm -it --cap-add=NET_RAW --cap-add=NET_ADMIN -v "$PWD/out:/out" kalilinux/kali-rolling bash -lc "apt-get update && apt-get install -y masscan && masscan
`getcap -r /usr/lib/nmap/nmap /usr/bin/nmap 2>/dev/null || true`
`setcap cap_net_raw,cap_net_bind_service+eip /usr/lib/nmap/nmap`
High-speed discovery with guardrails and verification
Repeatable workflow for large-scope internal scanning. Rate-limited MASSCAN discovers open ports, then targeted Nmap verifies and enriches results. Reduces false positives, avoids accidental network disruption, and keeps scope tight with exclude files.
Stop permissions and credential errors from killing cloud assessments
Prowler scans fail or produce noisy logs because of missing read-only permissions, expired session tokens, or credentials not mounted into containers. This recipe standardizes authentication, documents required policies, and provides a repeatable triage flow for AccessDenied and InvalidClientTokenId.
A playbook for "stops at the same frame" and "freeze mid-render" failures
Renders freeze at a consistent percentage or frame — often caused by a bad clip, a heavy effect, a Fusion comp issue, or "stop render on error" settings. This recipe classifies the failure pattern and gives you a structured triage plan instead of blind re-exports.
Fix a common Premiere playback-lag issue caused by audio input device settings
Severe playback lag and stutter in Premiere Pro that looks like a codec performance problem but is actually caused by audio hardware input settings. This recipe provides a quick decision tree to test and fix the issue — often resolved in under a minute by switching the default input to "No Input."