Nmap commands

Nmap commands

What it doesCommandDetails
Host Discoverynmap -sn targetDisables port scanning and performs
host discovery to identify live hosts
Port Scanningnmap -p port_range targetScans specified ports or
port ranges on the target
Service Version Detectionnmap -sV targetDetects version of services
running on open ports
Operating System Detectionnmap -O targetIdentifies the operating system
of the target host
Aggressive Scannmap -A targetPerforms OS detection, version detection
script scanning and traceroute
UDP Scannmap -sU -p port_range targetScans specified UDP ports on target
TCP Connect Scannmap -sT targetPerforms a TCP connect scan
to determine if ports are open or closed
SYN Scannmap -sS targetPerforms a stealth SYN scan to identify
open ports without completing the
TCP handshake
Firewall Evasionnmap -T”0-5″ targetAdjusts timing templates to evade
firewalls and intrusion
detection systems
Scan from Filenmap -iL input_file targetReads target hosts from a file and
performs the scan
Scan All Portsnmap -p targetScans all 65, 535 ports on
the target
Service Enumerationnmap –script script_name targetUses Nmap Scripting Engine (NES)
scripts to enumerate services and
gather additional information
Scan Specific Portsnmap -p port1,port2 targetScans specific ports on the target
0 0 votes
Article Rating
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments