NMAP COMMANDS


Here are some scans

NMAP BASIC SCANS

Single Target     > nmap <IP Target>
Multiple Target   > nmap IP, IP
List of Targets   > nmap -iL <IP Target>
Range of Hosts    > nmap <IP - IP>
Entire Subnet     > nmap <IP Target>/cdir
Random Host       > nmap -iR <IP Target>
Aggressive Scan   > nmap -A <IP Target>
IPv6 Target Scan  > nmap -G <IP Target>

NMAP DISCOVERY SCANS

PING Scan                > nmap -sP <IP Target>
Don't PING Specific IP   > nmap -PN <IP Target>
TCP SYN PING             > nmap -PS <IP Target>
TCP ACK PING             > nmap -PA <IP Target>
UDP PING                 > nmap -PU <IP Target>
SCTP Init PING           > nmap -PT <IP Target>
ICMP echo PING           > nmap -PE <IP Target>
ICMP timestamp PING      > nmap -PP <IP Target>
ICMP add mask PING       > nmap -PM <IP Target>
IP Protocol PING         > nmap -PO <IP Target>
ARP PING                 > nmap -PR <IP Target>
Traceroute               > nmap -traceroute <IP Target>

NMAP ADVANCED SCANNER OPTIONS

TCP SYN SCAN                > nmap -sS <IP Target>
TCP Connect SCAN            > nmap -sT <IP Target>
UDP SCAN                    > nmap -sU <IP Target>
TCP Null SCAN               > nmap -sN <IP Target>
TCP FIN SCAN                > nmap -sF <IP Target>
XMAS SCAN                   > nmap -sX <IP Target>
TCP ACK SCAN                > nmap -sA <IP Target>
Custom TCP SCAN             > nmap -scanflags <IP Target>
IP Protocol SCAN            > nmap -sO <IP Target>
Send Raw Ethernet Packets   > nmap -send-eth <IP Target>
Send IP Packets             > nmap -send-ip <IP Target>

NMAP PORT SCANNER OPTIONS

Fast SCAN                   > nmap -F <IP Target>
Specific ports SCAN         > nmap -p [Port #] <IP Target>
Port by Name SCAN           > nmap -p [Port Name] <IP Target>
Port by Protocol SCAN       > nmap -sU -sT -pU
All Ports SCAN              > nmap -p "*" <IP Target>
Sequential Port SCAN        > nmap -r <IP Target>

NMAP VERSION DETECTION

OS Detection              > nmap -O <IP Target>
Attempt to Guess          > nmap -O -osscan-guess <IP Target>
Service Version Detection > nmap -sV <IP Target>

results matching ""

    No results matching ""