Nmap Flashcards
What protocol does Nmap begin scanning with when scanning the subnet of a local network?
When scanning a directly connected network, Nmap starts by sending ARP requests. When a device responds to the ARP request, Nmap labels it with “Host is up”.
[CMD] List scan to show the IP’s that will be scanned
nmap -sL [IP.1/24] (Planning of IPs to scan)
What is the easiest and most basic way to know whether a TCP port is open?
Telnet ip port
[CMD] Connect scan flag
-sT
[CMD] Syn scan flag
-sS
What are the supposed benefits of doing a Syn Scan? (-sS)
The TCP handshake is never established and thus the connection is never established. This is concidered a stealth scan, since fewer logs and detection risks are expected when you do the port scanning this way.
[CMD] UDP scan
-sU
What does the flag -F do?
Fast mode – scans the 100 most common ports
-p[range] what does this do?
scan ports in range defined. E.g. -p10-1024
[Flag] How do you enable OS detection?
-O
[Flag] A lot of the goodies in one flag (Traceroute, version, OS detection and some more)
-A
[Flag] Scan hosts that appears to be down
-Pn
[Flag] Control the rate of packets send per second
–min-rate // –max-rate <number></number>
[Flag] -oN
Normal output
[Flag] -oX
XML output
[Flag] -oG
Grepable output
[Flag] -oA
Output in major formats
[Flag] -v
Verbose, real time updates
[Flag] -d
Debug mode
[Flag] How do you scale the number of parallel probes?
–min-parallelism <numprobes> / max</numprobes>