Nmap switches Flashcards
‘nmap 192.168.1.1’
Scans a single IP
‘nmap 192.168.1.1 192.168.2.1’
Scans specified IPs
‘nmap 192.168.1.1-254’
Scans the range
‘nmap scanme.nmap.org’
Scans the scanme.nmap.org domain
‘nmap 192.168.1.0/24’
Scans using the CIDR notation
‘nmap -iL targets.txt’
Scans targets from the targets.txt file
-iL switch is ‘Input List’
‘nmap -iR 100’
Scans 100 random targets
-iR switch chooses a certain number of random targets
‘nmap –exclude 192.168.1.1’
Excludes listed hosts
‘nmap 192.168.1.1 -sS’
TCP SYN port scan (Default)
‘nmap 192.168.1.1 -sT’
TCP connect port scan
‘nmap 192.168.1.1 -sU’
UDP Port Scan
‘nmap 192.168.1.1 -sA’
TCP ACK Port Scan
‘nmap 192.168.1.1 -sW’
TCP Window port scan
‘nmap 192.168.1.1 -sM’
TCP Maimon Port Scan
‘nmap 192.168.1.1 -p 21’
Port scan for port 21
‘nmap 192.168.1.1 -p 21-100’
Scans port range 21-100
nmap 192.168.1.1 -p U:53,T:21,80’
Scans UDP port 53 and TCP Port 21 and 80
‘nmap 192.168.1.1 192.168.1.1 -p-‘
Port scans all ports
‘nmap 192.168.1.1 -p http,https’
Port scan for service names
‘nmap 192.168.1.1 -F’
Fast port scan (100 ports)
‘nmap 192.168.1.1 –top-ports 2000’
Port scan the top x ports
‘nmap 192.168.1.1 -p-65535’
Leaving off initial port in range makes the scan start at port 1
‘nmap 192.168.1.1 -p0-‘
Leaving off end port in rage makes the scan through to port 65535
‘nmap 192.168.1.1 -sV’
Attempts to determine the version of the service running on the port
‘nmap 192.168.1.1 -sV –version-intensity 8’
Intensity level 0 to 9.
Higher number increases possibility of correctness
‘nmap 192.168.1.1 -sV –version-light’
Enables light mode. Lower possibility of correctness. Faster
‘nmap 192.168.1.1 –version-all’
Enable intensity level 9.
Higher possibility of correctness.
Slower
‘nmap 192.168.1.1 -A’
Enables OS detection, version detection, script scanning and traceroute
‘nmap 192.168.1.1 -O’
Remote OS detection using TCP/IP stack fingerprinting
‘nmap 192.168.1.1 -O –osscan-limit’
If at least one open and one closed TCP port are not found it will not try to detect OS against the host
‘nmap 192.168.1.1 -O –sscan-guess’
Makes Nmap guess more aggressively
‘nmap 192.168.1.1 -O –max-os-tries 1’
Set the maximum number x of OS detection tries against a target
‘nmap 192.168.1.1 -A’
Enables oS detection, version detection, script scanning and traceroute
‘nmap 192.168.1.1 -T0’
Paranoid (P) Intrusion detection system evasion
‘nmap 192.168.1.1 -T1’
Sneaky (1) Intrusion Detection System evasion
‘nmap 192.168.1.1 -T2’
Polite (2) slows down the scan to use less bandwidth and use less target machine resources
‘nmap 192.168.1.1 -T3’
Normal (3) which is default spped