NMAP Cheat Sheet Flashcards

1
Q

TCP SYN port scan (Default)

A

-sS

Example:
nmap 192.168.1.1 -sS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TCP connect port scan

Default without root privilege

A

-sT

Example:
nmap 192.168.1.1 -sT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

UDP port scan

A

-sU

Example:
nmap 192.168.1.1 -sU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TCP ACK port scan

A

-sA

Example:
nmap 192.168.1.1 -sA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TCP Window port scan

A

-sW

Example:
nmap 192.168.1.1 -sW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TCP Maimon port scan

A

-sM

Example:
nmap 192.168.1.1 -sM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

No Scan. List targets only

A

-sL

Example:
nmap 192.168.1.1-3 -sL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Disable port scanning. Host discovery only.

- Good for seeing which hosts on a network are up

A

-sn

Example:
nmap 192.168.1.1/24 -sn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Disable host discovery. Port scan only.

- Good for more intrusive scans and saves time

A

-Pn

Example:
nmap 192.168.1.1-5 -Pn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Port range

A

-p

Example:
nmap 192.168.1.1 -p 21-100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Port scan multiple TCP and UDP ports

A

-p

Example:
nmap 192.168.1.1 -p U:53,T:21-25,80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Port scan all ports

A

-p-

Example:
nmap 192.168.1.1 -p-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fast port scan (100 ports)

A

-F

Example:
nmap 192.168.1.1 -F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attempts to determine the version of the service running on port

A

-sV

Example:
nmap 192.168.1.1 -sV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Enables OS detection, version detection, script scanning, and traceroute

A

-A

Example:
nmap 192.168.1.1 -A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Remote OS detection using TCP/IP stack fingerprinting

A

-O

Example:
nmap 192.168.1.1 -O

17
Q
  • Scan speed setting

- Paranoid Intrusion Detection System evasion

A

-T0

Example:
nmap 192.168.1.1 -T0

18
Q
  • Scan speed setting

- Sneaky Intrusion Detection System evasion

A

-T1

Example:
nmap 192.168.1.1 -T1

19
Q
  • Scan speed setting

- Polite slows down the scan to use less bandwidth and use less target machine resources

A

-T2

Example:
nmap 192.168.1.1 -T2

20
Q
  • Scan speed setting

- Normal which is default speed

A

-T3

Example:
nmap 192.168.1.1 -T3

21
Q
  • Scan speed setting

- Aggressive speeds scans; assumes you are on a reasonably fast and reliable network

A

-T4

Example:
nmap 192.168.1.1 -T4

22
Q
  • Scan speed setting

- Insane speeds scan; assumes you are on an extraordinarily fast network

A

-T5

Example:
nmap 192.168.1.1 -T5

23
Q

Requested scan (including ping scans) use tiny fragmented IP packets. Harder for packet filters

A

-f

Example:
nmap 192.168.1.1 -f

24
Q

Send scans from spoofed IPs

A

-D

Example:
nmap -D 192.168.1.101,192.168.1.102,192.168.1.103,192.168.1.23 192.168.1.1

25
Q

Use given source port number

A

-g

Example:
nmap -g 53 192.168.1.1

26
Q

Normal output to the file normal.file

A

-oN

Example:
nmap 192.168.1.1 -oN normal.file

27
Q

XML output to the file xml.file

A

-oX

Example:
nmap 192.168.1.1 -oX xml.file

28
Q

Grepable output to the file grep.file

A

-oG

Example:
nmap 192.168.1.1 -oG grep.file

29
Q

Output in the three major formats at once

A

-oA

Example:
nmap 192.168.1.1 -oA results

30
Q

Increase the amount of info (use twice or more for greater effect)

A

-v

Example:
nmap 192.168.1.1 -v

31
Q

Scan targets from a file

A

-iL

Example:
nmap -iL targets.txt

32
Q

Scan 100 random hosts

A

-iR

Example:
nmap -iR 100