Nmap Commands Flashcards
nmap -sS scan syn
This is a fast technique (also referred to as half-open scanning) as the scanning host requests a connection without acknowledging it. The target’s response to the scan’s SYN packet identifies the port state.
nmap -sT scan tcp
A half-open scan requires Nmap to have privileged access to the network driver so that it can craft packets. If privileged access is not available, Nmap must use the OS to attempt a full TCP connection. This type of scan is less stealthy.
nmap -sU scan udp
Scan UDP ports. As these do not use ACKs, Nmap needs to wait for a response or timeout to determine the port state, so UDP scanning can take a long time. A UDP scan can be combined with a TCP scan.
nmap -p port range
Use the -p argument to specify a port range.
nmap –top-ports
scans top ports
nmap -sV
probes for more information, such as software version.