Nmap
Scanning:
Ping Scan:
>> nmap -v -sn 192.168.50.0/24
>> nmap -v -sn 192.168.50.102
Favs:
nmap -A -oA nmap 10.x.x.x
nmap -sC -sV -oA nmap 10.x.x.x ..same! A = -sC -sV
nmap -p0-65535 -Pn -sT 10.x.x.x ..All TCP ports No Ping
nmap -p0-65535 -Pn -sU 10.x.x.x ..All UDP ports No Ping
nmap -A -sT -T4 10.x.x.x -oA target -Pn ..NSE/Def, TCP, Fast, AllOuts, Avoid ping
nmap -Pn --script vuln 10.x.x.x ..Find VULNS, No Pings
---------------------------------------------------------------
---------------------------------------------------------------
nmap
nmap -p 445 10.10.10.10 10.10.10.20
-T3 .. Normal, default
-T4 .. Aggressive, is fine for most any network
-T5 .. Insane. Too fast, dont use.
---------------------------------------------------------------
---------------------------------------------------------------
nmap -p 445 10.10.10.10 10.10.10.20 ..two targets
nmap -p0-65535 -Pn 192.168.17.154 ..all ports
nmap -n -sS -T4 -p 80 10.0.3.0/24 ..stealthScan 80
nmap -P 10.0.0.0-3 ..4 subnets
nmap -sV --script=banner 192.168.1.50 ..svc-ver and banners
nmap -sS -O -p 80-443 145.18.24.7 ..stealthScan os ports
nmap -sn 10.0.128.0/24 ..ping scan
nmap -sL 10.0.128.0/24 ..List scan ns-resolution
nmap -sn 10.0.128.0/24 --packet-trace ..show onscreen
nmap -sT 10.x.x.x -oA tartet -Pn ..TCP, output, avoid ping
---------------------------------------------------------------
---------------------------------------------------------------
sneaky
Avoid IDS detection
nmap -sT skillsetlocal.com -p 21,80 -T sneaky
Insane 'FAST'
nmap -sT skillsetlocal.com -p 21,80 -T insane
Speeds:
paranoid, sneaky, polite, normal, aggressive, insane
Scan Delay:
nmap -sT skillsetlocal.com -p 21,80 --scan-delay 5s
Syn Scan:
Half-open scan (stealthy)
nmap -sS skillsetlocal.com
nmap 192.168.1.1 -p- ..all ports but Zero
nmap 192.168.1.* -sL ..list targets
nmap -A -T4 cloudflare.com ..os/svc and fast
nmap --top-ports 20 192.168.1.106 ..top 20 ports
nmap -Pn 1.1.1.1,2,3,7 ..Disable host discovery. Port scan only.
nmap -p 8.8.8.* --exclude 8.8.8.1
nmap 8.8.8.1-14
nmap -p 1-65535 localhost
NFS - Find and Enum
Stylesheet
NSE Scripts
grep for ports
NMAP PrivEsc
Older Version of nmap has 'interactive mode' If you are allowed sudo, this could be PrivEsc
Last updated
Was this helpful?