Nmap
My notes for using Nmap
-VPrints version number-AAggressive scanning-vverbose-vvdouble verbose-oGoutput in greppable format. It saves the Nmap scan results in a grep-friendly plain text format-p [port]scans a specific port-p-Scan all 65,535 ports-sVservice version detection - It attempts to detect the version of the services running on open ports of a target system.-FFast scan - targets only common ports--openonly scans open ports (fast)-sSPerforms a SYN scan - good for stealth scanning and can't be detected,-sUScans for UDP-sCScript scan - Nmap runs its own default scripts to gather more information-OOS detection-sTDoes a full TCP 3 way handshake with the port and immediately closes it-sN"Ping Scan" - it tells Nmap not to perform a port scan, but instead to only discover hosts on the network. (undetectable)-Pn"No Ping" - tells Nmap to skip host discovery and treat all targets as online, even if they don’t respond to ping or discovery probes.--max-retries 0The--max-retries 0option in Nmap tells it to not retry sending a probe if it doesn't get a response the first time.-vvvmax verbosity (basically shows the scanning realtime)-sAthis type of scan is more suitable to discover firewall rule sets and configuration.
Last updated