NMAP Switches Flashcards

1
Q

What is this NMAP switch: -sV

A

Detect version of service running on port –> scans every open port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

-Pn

A

nmap 192.168.1.1-5 -Pn

No ping.
This option skips the host discovery stage altogether.
Disabling host discovery with -Pn causes Nmap to attempt the requested scanning functions against every target IP address specified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is this NMAP switch: -T0 -T1 -T2 -T3…T5

A

timing & performance. T0 = paranoid, T1 = sneeky (slow), T2 = polite, T3 = normal, T4 = aggressive, T5 = insane

-T0

nmap 192.168.1.1 -T0

Paranoid (0) Intrusion Detection
System evasion

-T1

nmap 192.168.1.1 -T1

Sneaky (1) Intrusion Detection System
evasion

-T2

nmap 192.168.1.1 -T2

Polite (2) slows down the scan to use
less bandwidth and use less target
machine resources

-T3

nmap 192.168.1.1 -T3

Normal (3) which is default speed

-T4

nmap 192.168.1.1 -T4

Aggressive (4) speeds scans; assumes
you are on a reasonably fast and
reliable network

-T5

nmap 192.168.1.1 -T5

Insane (5) speeds scan; assumes you
are on an extraordinarily fast network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is this NMAP switch: -sU

A

scan UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is this NMAP switch: -O

A

Remote OS detection using TCP/IP

stack fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is this NMAP switch: -sS

A

TCP Syn port scan (aka stealth scan)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is this NMAP switch: -sn

A

ping scan only

-sn tells Nmap not to do a port scan after host discovery, and only print out the available hosts that responded to the host discovery probes. This is often known as a “ping scan”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is this NMAP switch: -Pn

A

nmap 192.168.1.1-5 -Pn

port scan only - no ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is this NMAP switch: -O

A

O/S scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is this NMAP switch: -iL

A

scan each server in file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is this NMAP switch: -sL

A

list servers, but does not scan them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is this NMAP switch: -oX

A

save output in XML file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is this NMAP switch: -oG

A

save scan in greppable format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is this NMAP switch: -sn

A

PING only
nmap 192.168.1.1/24 -sn

Disable port scanning. Host discovery only (ping).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is this NMAP switch: -sT

A

-sT

nmap 192.168.1.1 -sT

Full 3-way TCP connect port scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

-sx

A

xmas tree

Sets the FIN, PSH, and URG flags, lighting the packet up like a Christmas tree.

17
Q

-sF

A

Sets just the TCP FIN bit.

sneaky through firewalls

18
Q

-PS

A

This option sends an empty TCP packet with the SYN flag set. The default destination port is 80

19
Q

-PA

A

The TCP ACK ping is quite similar to the -PS.

The difference, as you could likely guess, is that the TCP ACK flag is set instead of the SYN flag.

Port 80 by default

20
Q

-PU

A

UDP discovery on port x.

Port 40125 by default

21
Q

-PR

A

ARP discovery on local network

22
Q

-n

A

Never do DNS resolution

23
Q

-D

A

send scans from spoofed IPs

24
Q

Full Open Scanning

A

ensures the response that the targeted host is live and the connection is complete

25
Q

Discovery Scan

A

identifies the operating systems that are running on a network, maps those systems to IP addresses, and enumerates the open ports and services on those systems.

26
Q

-A

A

Enables OS detection, version detection, script scanning, and traceroute

27
Q

-p

A

specific ports to be used

-p22,25

27
Q

-p

A

specific ports to be used

-p22,25

27
Q

-p

A

specific ports to be used

  • p22,25
  • p U:53,T:22