Network

Nmap commands
What it does | Command | Details |
---|---|---|
Host Discovery | nmap -sn target | Disables port scanning and performs host discovery to identify live hosts |
Port Scanning | nmap -p port_range target | Scans specified ports or port ranges on the target |
Service Version Detection | nmap -sV target | Detects version of services running on open ports |
Operating System Detection | nmap -O target | Identifies the operating system of the target host |
Aggressive Scan | nmap -A target | Performs OS detection, version detection script scanning and traceroute |
UDP Scan | nmap -sU -p port_range target | Scans specified UDP ports on target |
TCP Connect Scan | nmap -sT target | Performs a TCP connect scan to determine if ports are open or closed |
SYN Scan | nmap -sS target | Performs a stealth SYN scan to identify open ports without completing the TCP handshake |
Firewall Evasion | nmap -T”0-5″ target | Adjusts timing templates to evade firewalls and intrusion detection systems |
Scan from File | nmap -iL input_file target | Reads target hosts from a file and performs the scan |
Scan All Ports | nmap -p target | Scans all 65, 535 ports on the target |
Service Enumeration | nmap –script script_name target | Uses Nmap Scripting Engine (NES) scripts to enumerate services and gather additional information |
Scan Specific Ports | nmap -p port1,port2 target | Scans specific ports on the target |
Subscribe
Login
0 Comments
Oldest