Nmap switches Flashcards
‘nmap 192.168.1.1’
Scans a single IP
‘nmap 192.168.1.1 192.168.2.1’
Scans specified IPs
‘nmap 192.168.1.1-254’
Scans the range
‘nmap scanme.nmap.org’
Scans the scanme.nmap.org domain
‘nmap 192.168.1.0/24’
Scans using the CIDR notation
‘nmap -iL targets.txt’
Scans targets from the targets.txt file
-iL switch is ‘Input List’
‘nmap -iR 100’
Scans 100 random targets
-iR switch chooses a certain number of random targets
‘nmap –exclude 192.168.1.1’
Excludes listed hosts
‘nmap 192.168.1.1 -sS’
TCP SYN port scan (Default)
‘nmap 192.168.1.1 -sT’
TCP connect port scan
‘nmap 192.168.1.1 -sU’
UDP Port Scan
‘nmap 192.168.1.1 -sA’
TCP ACK Port Scan
‘nmap 192.168.1.1 -sW’
TCP Window port scan
‘nmap 192.168.1.1 -sM’
TCP Maimon Port Scan
‘nmap 192.168.1.1 -p 21’
Port scan for port 21
‘nmap 192.168.1.1 -p 21-100’
Scans port range 21-100
nmap 192.168.1.1 -p U:53,T:21,80’
Scans UDP port 53 and TCP Port 21 and 80
‘nmap 192.168.1.1 192.168.1.1 -p-‘
Port scans all ports
‘nmap 192.168.1.1 -p http,https’
Port scan for service names
‘nmap 192.168.1.1 -F’
Fast port scan (100 ports)
‘nmap 192.168.1.1 –top-ports 2000’
Port scan the top x ports
‘nmap 192.168.1.1 -p-65535’
Leaving off initial port in range makes the scan start at port 1
‘nmap 192.168.1.1 -p0-‘
Leaving off end port in rage makes the scan through to port 65535
‘nmap 192.168.1.1 -sV’
Attempts to determine the version of the service running on the port
‘nmap 192.168.1.1 -sV –version-intensity 8’
Intensity level 0 to 9.
Higher number increases possibility of correctness
‘nmap 192.168.1.1 -sV –version-light’
Enables light mode. Lower possibility of correctness. Faster
‘nmap 192.168.1.1 –version-all’
Enable intensity level 9.
Higher possibility of correctness.
Slower
‘nmap 192.168.1.1 -A’
Enables OS detection, version detection, script scanning and traceroute
‘nmap 192.168.1.1 -O’
Remote OS detection using TCP/IP stack fingerprinting
‘nmap 192.168.1.1 -O –osscan-limit’
If at least one open and one closed TCP port are not found it will not try to detect OS against the host
‘nmap 192.168.1.1 -O –sscan-guess’
Makes Nmap guess more aggressively
‘nmap 192.168.1.1 -O –max-os-tries 1’
Set the maximum number x of OS detection tries against a target
‘nmap 192.168.1.1 -A’
Enables oS detection, version detection, script scanning and traceroute
‘nmap 192.168.1.1 -T0’
Paranoid (P) Intrusion detection system evasion
‘nmap 192.168.1.1 -T1’
Sneaky (1) Intrusion Detection System evasion
‘nmap 192.168.1.1 -T2’
Polite (2) slows down the scan to use less bandwidth and use less target machine resources
‘nmap 192.168.1.1 -T3’
Normal (3) which is default spped
‘nmap 192.168.1.1 -T4’
Aggressive (4) speeds scans; assumes you are on a reasonably fast and reliable network
‘nmap 192.168.1.1 -T5’
Insane (5) speeds scan; assumes you are on an extraordinary fast network
‘nmap –host-timeout
Give up on target after this long
Acceptable input examples:
1s;4m;2h
–min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout
Specifies probe round trip time
Acceptable input examples:
1s;4m;2h
–min-hostgroup/max-hostgroup
Parallel host scan group sizes
Input examples:
50;1024
–min-parallelism/max-parraellelism
Probe parallelization
Input examples:
10;1
–scan-delay/–max-scan-delay (time)
Adjust delay between probes
Input examples:
20ms;2s;4m;5h
–max-retries
Specify the maximum number of port scans probe retransmission’s
Input examples:
1-100
–min-rate
Send packets no slower than per second
–max-rate
Send packets no faster than < number> per second
‘nmap 192.168.1.1 -sC’
Scan with default NSE scripts
Considered useful for discovery and safe
‘nmap 192.168.1.1 –script default’
Scan with default NSE scripts.
Considered useful for discovery and safe
‘nmap 192.168.1.1 –script=banner’
Scan with a single script.
Example banner
‘nmap 192.168.1.1 –script=http*’
Scan with a wildcard
Example http
‘nmap 192.168.1.1 –script=http,banner’
Scan with two scripts. Example http and banner
‘nmap 192.168.1.1 –script “not intrusive”
Scan default, but remove intrusive scripts
‘nmap –script snmp-sysdescr –script-args snmpcommunity=admin 192.168.1.1’
NSE script with arguments
‘nmap -Pn –script=http-sitemap-generator scanme.nmap.org’
http site map generator
‘nmap -n -Pn -p 80 –open -sV -vvv –script banner, http-title -iR 1000’
Fast search for random web servers
nmap -Pn –script=dns-brute domain.com
Brute forces DNS hostname guessing subdomains
nmap -n -Pn -vv -O -sV –script smb-enum,smb-ls,smb-mbenum,smb-os-discovery,smb-s,smb-vuln,smbv2 -vv 192.168.1.1
Safe SMB scripts to run
nmap –script whois* domain.com
Whois query
nmap -p80 –script http-unsafe-output-escaping scanme.nmap.org
Detect cross site scripting vulnerabiltiies
nmap -p80 –script http-sql-injection scanme.nmap.org
Check for SQL injections
nmap 192.168.1.1 -f
Requested scan (including ping scans) use tiny fragmented IP packets. Harder for packet filters
nmap 192.168.1.1 –mtu 32
Set your own offset size
nmap -D 192.168.1.101,192.168.1.102,
192.168.1.103,192.168.1.23 192.168.1.1
Send scans from spoofed IPs
nmap -D decoy-ip1,decoy-ip2,your-own-ip,decoy-ip3,decoy-ip4 remote-host-ip
Above example explained
nmap -S www.microsoft.com www.facebook.com
Scan Facebook from Microsoft (-e eth0 -Pn may be required)
nmap –proxies http://192.168.1.1:8080, http://192.168.1.2:8080 192.168.1.1
Relay connections through HTTP/SOCKS4 proxies
nmap –data-length 200 192.168.1.1
Appends random data to sent packets
nmap 192.168.1.1 -oN normal.file
Normal output to the file normal.file
nmap 192.168.1.1 -oX xml.file
XML output to the file xml.file
nmap 192.168.1.1 -oG grep.file
Grepable output to the file grep.file
nmap 192.168.1.1 -oA results
Output in the three major formats at once
nmap 192.168.1.1 -oG -
Grepable output to screen. -oN -, -oX - also usable
nmap 192.168.1.1 -oN file.file –append-output
Append a scan to a previous scan file
nmap 192.168.1.1 -v
Increase the verbosity level (use -vv or more for greater effect)
nmap 192.168.1.1 -d
Increase debugging level (use -dd or more for greater effect)
nmap 192.168.1.1 –reason
Display the reason a port is in a particular state, same output as -vv
nmap 192.168.1.1 –open
Only show open (or possibly open) ports
nmap 192.168.1.1 -T4 –packet-trace
Show all packets sent and received
nmap –iflist
Shows the host interfaces and routes
nmap –resume results.file
Resume a scan
nmap -p80 -sV -oG - –open 192.168.1.1/24 | grep open
Scan for web servers and grep to show which IPs are running web servers
nmap -iR 10 -n -oX out.xml | grep “Nmap” | cut -d “ “ -f5 > live-hosts.txt
Generate a list of the IPs of live hosts
nmap -iR 10 -n -oX out2.xml | grep “Nmap” | cut -d “ “ -f5»_space; live-hosts.txt
Append IP to the list of live hosts
ndiff scanl.xml scan2.xml
Compare output from nmap using the ndif
xsltproc nmap.xml -o nmap.html
Convert nmap xml files to html files
grep “ open “ results.nmap | sed -r ‘s/ +/ /g’ | sort | uniq -c | sort -rn | less
Reverse sorted list of how often ports turn up
nmap -6 2607:f0d0:1002:51::4
Enable IPv6 scanning
nmap -h
nmap help screen
nmap -iR 10 -PS22-25,80,113,1050,35000 -v -sn
Discovery only on ports x, no port scan
nmap 192.168.1.1-1/24 -PR -sn -vv
Arp discovery only on local network, no port scan
nmap -iR 10 -sn -traceroute
Traceroute to random targets, no port scan
nmap 192.168.1.1-50 -sL –dns-server 192.168.1.1
Query the Internal DNS for hosts, list targets only