Nmap
Scanning:
Ping Scan:
>> nmap -v -sn 192.168.50.0/24
>> nmap -v -sn 192.168.50.102
Favs:
nmap -A -oA nmap 10.x.x.x
nmap -sC -sV -oA nmap 10.x.x.x ..same! A = -sC -sV
nmap -p0-65535 -Pn -sT 10.x.x.x ..All TCP ports No Ping
nmap -p0-65535 -Pn -sU 10.x.x.x ..All UDP ports No Ping
nmap -A -sT -T4 10.x.x.x -oA target -Pn ..NSE/Def, TCP, Fast, AllOuts, Avoid ping
nmap -Pn --script vuln 10.x.x.x ..Find VULNS, No Pings
---------------------------------------------------------------
---------------------------------------------------------------
nmap
nmap -p 445 10.10.10.10 10.10.10.20
-T3 .. Normal, default
-T4 .. Aggressive, is fine for most any network
-T5 .. Insane. Too fast, dont use.
---------------------------------------------------------------
---------------------------------------------------------------
nmap -p 445 10.10.10.10 10.10.10.20 ..two targets
nmap -p0-65535 -Pn 192.168.17.154 ..all ports
nmap -n -sS -T4 -p 80 10.0.3.0/24 ..stealthScan 80
nmap -P 10.0.0.0-3 ..4 subnets
nmap -sV --script=banner 192.168.1.50 ..svc-ver and banners
nmap -sS -O -p 80-443 145.18.24.7 ..stealthScan os ports
nmap -sn 10.0.128.0/24 ..ping scan
nmap -sL 10.0.128.0/24 ..List scan ns-resolution
nmap -sn 10.0.128.0/24 --packet-trace ..show onscreen
nmap -sT 10.x.x.x -oA tartet -Pn ..TCP, output, avoid ping
---------------------------------------------------------------
---------------------------------------------------------------
sneaky
Avoid IDS detection
nmap -sT skillsetlocal.com -p 21,80 -T sneaky
Insane 'FAST'
nmap -sT skillsetlocal.com -p 21,80 -T insane
Speeds:
paranoid, sneaky, polite, normal, aggressive, insane
Scan Delay:
nmap -sT skillsetlocal.com -p 21,80 --scan-delay 5s
Syn Scan:
Half-open scan (stealthy)
nmap -sS skillsetlocal.com
nmap 192.168.1.1 -p- ..all ports but Zero
nmap 192.168.1.* -sL ..list targets
nmap -A -T4 cloudflare.com ..os/svc and fast
nmap --top-ports 20 192.168.1.106 ..top 20 ports
nmap -Pn 1.1.1.1,2,3,7 ..Disable host discovery. Port scan only.
nmap -p 8.8.8.* --exclude 8.8.8.1
nmap 8.8.8.1-14
nmap -p 1-65535 localhost
NFS - Find and Enum
Stylesheet
NSE Scripts
grep for ports
NMAP PrivEsc
Older Version of nmap has 'interactive mode' If you are allowed sudo, this could be PrivEsc
Last updated