Nmap switches Flashcards

1
Q

‘nmap 192.168.1.1’

A

Scans a single IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

‘nmap 192.168.1.1 192.168.2.1’

A

Scans specified IPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

‘nmap 192.168.1.1-254’

A

Scans the range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

‘nmap scanme.nmap.org’

A

Scans the scanme.nmap.org domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

‘nmap 192.168.1.0/24’

A

Scans using the CIDR notation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

‘nmap -iL targets.txt’

A

Scans targets from the targets.txt file

-iL switch is ‘Input List’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

‘nmap -iR 100’

A

Scans 100 random targets

-iR switch chooses a certain number of random targets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

‘nmap –exclude 192.168.1.1’

A

Excludes listed hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

‘nmap 192.168.1.1 -sS’

A

TCP SYN port scan (Default)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

‘nmap 192.168.1.1 -sT’

A

TCP connect port scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

‘nmap 192.168.1.1 -sU’

A

UDP Port Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

‘nmap 192.168.1.1 -sA’

A

TCP ACK Port Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

‘nmap 192.168.1.1 -sW’

A

TCP Window port scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

‘nmap 192.168.1.1 -sM’

A

TCP Maimon Port Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

‘nmap 192.168.1.1 -p 21’

A

Port scan for port 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

‘nmap 192.168.1.1 -p 21-100’

A

Scans port range 21-100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

nmap 192.168.1.1 -p U:53,T:21,80’

A

Scans UDP port 53 and TCP Port 21 and 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

‘nmap 192.168.1.1 192.168.1.1 -p-‘

A

Port scans all ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

‘nmap 192.168.1.1 -p http,https’

A

Port scan for service names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

‘nmap 192.168.1.1 -F’

A

Fast port scan (100 ports)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

‘nmap 192.168.1.1 –top-ports 2000’

A

Port scan the top x ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

‘nmap 192.168.1.1 -p-65535’

A

Leaving off initial port in range makes the scan start at port 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

‘nmap 192.168.1.1 -p0-‘

A

Leaving off end port in rage makes the scan through to port 65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

‘nmap 192.168.1.1 -sV’

A

Attempts to determine the version of the service running on the port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

‘nmap 192.168.1.1 -sV –version-intensity 8’

A

Intensity level 0 to 9.

Higher number increases possibility of correctness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

‘nmap 192.168.1.1 -sV –version-light’

A

Enables light mode. Lower possibility of correctness. Faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

‘nmap 192.168.1.1 –version-all’

A

Enable intensity level 9.
Higher possibility of correctness.
Slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

‘nmap 192.168.1.1 -A’

A

Enables OS detection, version detection, script scanning and traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

‘nmap 192.168.1.1 -O’

A

Remote OS detection using TCP/IP stack fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

‘nmap 192.168.1.1 -O –osscan-limit’

A

If at least one open and one closed TCP port are not found it will not try to detect OS against the host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

‘nmap 192.168.1.1 -O –sscan-guess’

A

Makes Nmap guess more aggressively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

‘nmap 192.168.1.1 -O –max-os-tries 1’

A

Set the maximum number x of OS detection tries against a target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

‘nmap 192.168.1.1 -A’

A

Enables oS detection, version detection, script scanning and traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

‘nmap 192.168.1.1 -T0’

A

Paranoid (P) Intrusion detection system evasion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

‘nmap 192.168.1.1 -T1’

A

Sneaky (1) Intrusion Detection System evasion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

‘nmap 192.168.1.1 -T2’

A

Polite (2) slows down the scan to use less bandwidth and use less target machine resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

‘nmap 192.168.1.1 -T3’

A

Normal (3) which is default spped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

‘nmap 192.168.1.1 -T4’

A

Aggressive (4) speeds scans; assumes you are on a reasonably fast and reliable network

39
Q

‘nmap 192.168.1.1 -T5’

A

Insane (5) speeds scan; assumes you are on an extraordinary fast network

40
Q

‘nmap –host-timeout

A

Give up on target after this long

Acceptable input examples:
1s;4m;2h

41
Q

–min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout

A

Specifies probe round trip time
Acceptable input examples:
1s;4m;2h

42
Q

–min-hostgroup/max-hostgroup

A

Parallel host scan group sizes
Input examples:
50;1024

43
Q

–min-parallelism/max-parraellelism

A

Probe parallelization
Input examples:
10;1

44
Q

–scan-delay/–max-scan-delay (time)

A

Adjust delay between probes
Input examples:
20ms;2s;4m;5h

45
Q

–max-retries

A

Specify the maximum number of port scans probe retransmission’s
Input examples:
1-100

46
Q

–min-rate

A

Send packets no slower than per second

47
Q

–max-rate

A

Send packets no faster than < number> per second

48
Q

‘nmap 192.168.1.1 -sC’

A

Scan with default NSE scripts

Considered useful for discovery and safe

49
Q

‘nmap 192.168.1.1 –script default’

A

Scan with default NSE scripts.

Considered useful for discovery and safe

50
Q

‘nmap 192.168.1.1 –script=banner’

A

Scan with a single script.

Example banner

51
Q

‘nmap 192.168.1.1 –script=http*’

A

Scan with a wildcard

Example http

52
Q

‘nmap 192.168.1.1 –script=http,banner’

A

Scan with two scripts. Example http and banner

53
Q

‘nmap 192.168.1.1 –script “not intrusive”

A

Scan default, but remove intrusive scripts

54
Q

‘nmap –script snmp-sysdescr –script-args snmpcommunity=admin 192.168.1.1’

A

NSE script with arguments

55
Q

‘nmap -Pn –script=http-sitemap-generator scanme.nmap.org’

A

http site map generator

56
Q

‘nmap -n -Pn -p 80 –open -sV -vvv –script banner, http-title -iR 1000’

A

Fast search for random web servers

57
Q

nmap -Pn –script=dns-brute domain.com

A

Brute forces DNS hostname guessing subdomains

58
Q

nmap -n -Pn -vv -O -sV –script smb-enum,smb-ls,smb-mbenum,smb-os-discovery,smb-s,smb-vuln,smbv2 -vv 192.168.1.1

A

Safe SMB scripts to run

59
Q

nmap –script whois* domain.com

A

Whois query

60
Q

nmap -p80 –script http-unsafe-output-escaping scanme.nmap.org

A

Detect cross site scripting vulnerabiltiies

61
Q

nmap -p80 –script http-sql-injection scanme.nmap.org

A

Check for SQL injections

62
Q

nmap 192.168.1.1 -f

A
Requested scan (including ping scans) use tiny fragmented IP packets.
Harder for packet filters
63
Q

nmap 192.168.1.1 –mtu 32

A

Set your own offset size

64
Q

nmap -D 192.168.1.101,192.168.1.102,

192.168.1.103,192.168.1.23 192.168.1.1

A

Send scans from spoofed IPs

65
Q

nmap -D decoy-ip1,decoy-ip2,your-own-ip,decoy-ip3,decoy-ip4 remote-host-ip

A

Above example explained

66
Q

nmap -S www.microsoft.com www.facebook.com

A

Scan Facebook from Microsoft (-e eth0 -Pn may be required)

67
Q

nmap –proxies http://192.168.1.1:8080, http://192.168.1.2:8080 192.168.1.1

A

Relay connections through HTTP/SOCKS4 proxies

68
Q

nmap –data-length 200 192.168.1.1

A

Appends random data to sent packets

69
Q

nmap 192.168.1.1 -oN normal.file

A

Normal output to the file normal.file

70
Q

nmap 192.168.1.1 -oX xml.file

A

XML output to the file xml.file

71
Q

nmap 192.168.1.1 -oG grep.file

A

Grepable output to the file grep.file

72
Q

nmap 192.168.1.1 -oA results

A

Output in the three major formats at once

73
Q

nmap 192.168.1.1 -oG -

A

Grepable output to screen. -oN -, -oX - also usable

74
Q

nmap 192.168.1.1 -oN file.file –append-output

A

Append a scan to a previous scan file

75
Q

nmap 192.168.1.1 -v

A

Increase the verbosity level (use -vv or more for greater effect)

76
Q

nmap 192.168.1.1 -d

A

Increase debugging level (use -dd or more for greater effect)

77
Q

nmap 192.168.1.1 –reason

A

Display the reason a port is in a particular state, same output as -vv

78
Q

nmap 192.168.1.1 –open

A

Only show open (or possibly open) ports

79
Q

nmap 192.168.1.1 -T4 –packet-trace

A

Show all packets sent and received

80
Q

nmap –iflist

A

Shows the host interfaces and routes

81
Q

nmap –resume results.file

A

Resume a scan

82
Q

nmap -p80 -sV -oG - –open 192.168.1.1/24 | grep open

A

Scan for web servers and grep to show which IPs are running web servers

83
Q

nmap -iR 10 -n -oX out.xml | grep “Nmap” | cut -d “ “ -f5 > live-hosts.txt

A

Generate a list of the IPs of live hosts

84
Q

nmap -iR 10 -n -oX out2.xml | grep “Nmap” | cut -d “ “ -f5&raquo_space; live-hosts.txt

A

Append IP to the list of live hosts

85
Q

ndiff scanl.xml scan2.xml

A

Compare output from nmap using the ndif

86
Q

xsltproc nmap.xml -o nmap.html

A

Convert nmap xml files to html files

87
Q

grep “ open “ results.nmap | sed -r ‘s/ +/ /g’ | sort | uniq -c | sort -rn | less

A

Reverse sorted list of how often ports turn up

88
Q

nmap -6 2607:f0d0:1002:51::4

A

Enable IPv6 scanning

89
Q

nmap -h

A

nmap help screen

90
Q

nmap -iR 10 -PS22-25,80,113,1050,35000 -v -sn

A

Discovery only on ports x, no port scan

91
Q

nmap 192.168.1.1-1/24 -PR -sn -vv

A

Arp discovery only on local network, no port scan

92
Q

nmap -iR 10 -sn -traceroute

A

Traceroute to random targets, no port scan

93
Q

nmap 192.168.1.1-50 -sL –dns-server 192.168.1.1

A

Query the Internal DNS for hosts, list targets only