NMAP Flashcards
Port Scan Type: Full Connect
AKA Tcp Connect or Full Open Scan. complete 3-way handshake torn down with RST. Easist to detect but most reliable. Open port respond with SYN\ACK– closed with RST
Port Scan Type: Stealth
AKA SYN scan or Half-open scan. Only SYN are sent. Open gets a syn/ack closed gets rst. Better at hiding scan and bypassing firewalls
Port Scan Type: Inverse TCP Flag
AKA Null or FIN scan Uses FIN URG or PSH flag or none at all. Open port gets no response. Closed gets RST/ACK
Port Scan Type: XMAS
XMAS URG, PSH FIN, flags are on. Open gets no response. closed gets RST/Ack
Port Scan Type: ACK Flag Probe
Probe with ACK. Look at return RST packet if TTL is less than 64 or the WINDOW size has anything other than 0 in it it is open. Also can be used to check filtering if there is no response there is a stateful firewall between attacker and host if a RST comes back there is not
Nmap switch: -sA
ACK scan
Nmap switch: -sF
FIN Scan
Nmap switch: -sI
IDLE Scan
Nmap switch: -sL
DNS or list scan.
Nmap switch: -sN
Null scan
Nmap switch: -sO
Protocol Scan
Nmap switch: -sP
Ping scan
Nmap switch: -sR
RPC Scan
Nmap switch: -sS
Syn scan
Nmap switch: -sT
TCP full connect
Nmap switch: -sW
Window scan
Nmap switch: -sX
Xmas Scan
Nmap switch: -PI -PE -PM -PP
ICMP ping
Nmap switch: -Po -PN
no ping
Nmap switch: -PS
Syn Ping
Nmap switch: -PT
TCP ping
Nmap switch: -oN
Normal output
Nmap switch: -oX
XML output
Nmap switch: -oG
GREPable output
Nmap switch: -oA
All formats including script kiddie
Nmap switch: -O
OS finger printing
Nmap switch: -A
aggressive scan includes version scan, script, protocol, and traceroute
Nmap switch: -F
Fast limited ports only 100
Nmap switch: -P
port range
Nmap switch: -iL
input from list
Nmap switch: -PR
ARP ping
Nmap switch: -f
Fragment package
Nmap switch: -T0
Serial slowest Paranoid 5 min between probes
Nmap switch: -T1
serial slowest Sneaky 15 seconds between probes
Nmap switch: -T2
Serial slow normal speed Polite .4 sec (400 mil seconds) between probes
Nmap switch:-T3
Parallel normal speed default (max delay of 1 sec )
Nmap switch:-T4
parallel fast scan aggressive max delay of 10 milsec)
nmap: -T5
insane mode caps and delay at 5ms
Nmap switch: -R -n
Dns resolution for everything and no DNS resolution for anything
Nmap switch: -D RND:10.0.0.0
creates decoy random ips with attackers ip interspersed as well
nmap –script http-trace -p80 localhost
detects server that uses trace
nmap –script http-google-email
lists email accounts
nmap –script hostmap-*
discovers virtual host the * is replaced with DB you are querying.
nmap –script http-enum -p80
enumerates common web applications
nmap -p 80 – script http-robots.txt
grabs robots.txt file
Full Open Scan. complete 3-way handshake torn down with RST. Easist to detect but most reliable. Open port respond with SYN\ACK– closed with RST
Port Scan Type: Full Connect
AKA SYN scan or Half-open scan. Only SYN are sent. Open gets a syn/ack closed gets rst. Better at hiding scan and bypassing firewalls
Port Scan Type: Stealth
AKA Null or FIN scan Uses FIN URG or PSH flag or none at all. Open port gets no response. Closed gets RST/ACK
Port Scan Type: Inverse TCP Flag
URG, PSH FIN, flags are on. Open gets no response. closed gets RST/Ack
Port Scan Type: XMAS
Look at return RST packet if TTL is less than 64 or the WINDOW size has anything other than 0 in it it is open. Also can be used to check filtering if there is no response there is a stateful firewall between attacker and host if a RST comes back there is not
Port Scan Type: ACK Flag Probe
ACK scan
Nmap switch: -sA
FIN Scan
Nmap switch: -sF
IDLE Scan
Nmap switch: -sI
DNS or list scan.
Nmap switch: -sL
Null scan
Nmap switch: -sN
Protocol Scan
Nmap switch: -sO
Ping scan
Nmap switch: -sP
RPC Scan
Nmap switch: -sR
Syn scan
Nmap switch: -sS
TCP full connect
Nmap switch: -sT
Window scan
Nmap switch: -sW
Xmas Scan
Nmap switch: -sX
ICMP ping
Nmap switch: -PI -PE -PM -PP
no ping
Nmap switch: -Po -PN
Syn Ping
Nmap switch: -PS
TCP ping
Nmap switch: -PT
Normal output
Nmap switch: -oN
XML output
Nmap switch: -oX
GREPable output
Nmap switch: -oG
All formats including script kiddie
Nmap switch: -oA
OS finger printing
Nmap switch: -O
scan includes version scan, script, protocol, and traceroute
Nmap switch: -A
Fast limited ports only 100
Nmap switch: -F
port range
Nmap switch: -P
input from list
Nmap switch: -iL
ARP ping
Nmap switch: -PR
Fragment package
Nmap switch: -f
Serial slowest Paranoid 5 min between probes
Nmap switch: -T0
serial slowest Sneaky 15 seconds between probes
Nmap switch: -T1
Serial slow normal speed Polite .4 sec (400 mil seconds) between probes
Nmap switch: -T2
Parallel normal speed default (max delay of 1 sec )
Nmap switch:-T3
parallel fast scan aggressive max delay of 10 milsec
Nmap switch:-T4
insane mode caps and delay at 5ms
nmap: -T5
Dns resolution for everything and no DNS resolution for anything
Nmap switch: -R -n
creates decoy random ips with attackers ip interspersed as well
Nmap switch: -D RND:10.0.0.0
detects server that uses trace
nmap –script http-trace -p80 localhost
lists email accounts
nmap –script http-google-email
discovers virtual host the * is replaced with DB you are querying.
nmap –script hostmap-*
enumerates common web applications
nmap –script http-enum -p80
grabs robots.txt file
nmap –script http-robots.txt
Nmap switch: -sC
Script Scan