Nmap
Basic Syntax
nmap <scan types> <options> <target>sudo nmap -sS localhostHOST DISCOVERY
Scan Network Range
sudo nmap 10.129.2.0/24 -sn -oA tnet | grep for | cut -d" " -f5Scan IP List
sudo nmap -sn -oA tnet -iL hosts.lst | grep for | cut -d" " -f5Scan Multiple IPs
Scan Single Ip to determine if its alive
Host and Port Scanning
Scanning Top 10 TCP Ports
Complete 3 way handshake TCP connection, aka Connect Scan
Dealing with Filtered Ports
UDP Port Scan
Determine if UDP packet arrived or not
Version Scan
SAVING RESULTS
Service Enumeration
Service Version Detection
Period Scan
Verbose Scan
Non Automated Scan
NMAP SCRIPT ENGINE
Default Script
Specific Script
Defined Script
Aggressive Scan
Vulnerability Scan
PERFORMANCE
Optimized RTT (Round Trip Time)
Max Retries
Rates
Timing
FIREWALL STUFF
SYN-Scan (normal port scan)
ACK-Scan (checks if port is filtered by a firewall or unfiltered)
Scan by Using Decoys
Scan by Using Different Source IP
DNS Proxying
SYN-Scan From DNS Port
Connect To The Filtered Port
Extras
Last updated