Nmap Flags Flashcards
-iL <xxx></xxx>
Scan targets from a file
-iR <xxx></xxx>
Scan <xxx> random hosts</xxx>
-sS
TCP SYN port scan (Default)
-sT
TCP connect port scan (Default without root privilege)
-sU
UDP port scan
-sA
TCP ACK port scan
-sW
TCP Window port scan
-sM
TCP Maimon port scan
-sL
No Scan. List targets only
-sn
Disable port scanning. Host discovery only
-Pn
Disable host discovery. Port scan only
-PS
TCP SYN discovery on port x. Port 80 by default
-PA
TCP ACK discovery on port x. Port 80 by default
-PU
UDP discovery on port x. Port 40125 by default
-PR
ARP discovery on local network
-n
never do DNS resolution
-p-
Scan all ports
-sV
Attempts to determine the version of the service running on the port
-A
Enables OS detection, version detection, script scanning, and traceroute
-O
Remote OS detection using TCP/IP fingerprinting
-f
Requested scan use tiny fragmented IP packets
-D
Send scans from spoofed IP
-oN normal.file
Normal output to the file normal.file
-oX xml.file
XML output to the file xml.file
-oG grep.file
Grepable output to the file grep.file
-oA
Output in the three major formats at once