Section 6: NMAP Flashcards
NMAP: -sL
List Scan (-sL)
o Lists the IP addresses from the supplied target range(s)
and performs a reverse-DNS query to discover any host
names associated with those IPs
NMAP: -PS
TCP SYN ping (-PS <PortList>)
o Probes specific ports from the given list using a TCP SYN
packet instead of an ICMP packet to conduct the ping</PortList>
NMAP: -Tn
Issues probes with using a timing pattern with n being the
pattern to utilize (0 is slowest and 5 is fastest
NMAP: -sl
Another stealth method, this scan makes it appear that
another machine (a zombie) started the scan to hide the
true identity of the scanning machine
NMAP: f or –mtu
Fragmentation (-f or –mtu)
o A technique that splits the TCP header of each probe
between multiple IP datagrams to make it hard for an IDS
or IPS to detect
Nmap Output
▪ Interactive (default) to screen
▪ Normal (-oN) to file
▪ XML (-oX) to file
▪ Grepable (-oG) to file
NMAP: -sS
TCP SYN (-sS)
▪ Conducts a half-open scan by sending a SYN packet to identify the port
state without sending an ACK packet afterwards
NMAP: -sT
o TCP Connect (-sT)
▪ Conducts a three-way handshake scan by sending a SYN packet to
identify the port state and then sending an ACK packet once the SYN-ACK
is received
NMAP: -sN
Null Scan (-sN)
▪ Conducts a scan by sending a packet with the header bit set to zero
NMAP: -sF
FIN Scan (-sF)
▪ Conducts a scan by sending an unexpected FIN packet
NMAP: -sX
Xmas Scan (-sX)
▪ Conducts a scan by sending a packet with the FIN, PSH, and URG flags set
to one
NMAP: -sU
UDP Scan (-sU)
▪ Conducts a scan by sending a UDP packet to the target and waiting for a
response or timeout
Which Nmap scan requires root access?
-sS - Half Scan, SYN Scan