BASH   83

nmap scan

Guest on 30th June 2022 04:07:00 PM

  1. Nmap V. 2.54BETA25 Usage: nmap [Scan Type(s)] [Options] <host or net list>
  2. Some Common Scan Types ('*' options require root privileges)
  3.   -sT TCP connect() port scan (default)
  4. * -sS TCP SYN stealth port scan (best all-around TCP scan)
  5. * -sU UDP port scan
  6.   -sP ping scan (Find any reachable machines)
  7. * -sF,-sX,-sN Stealth FIN, Xmas, or Null scan (experts only)
  8.   -sR/-I RPC/Identd scan (use with other scan types)
  9. Some Common Options (none are required, most can be combined):
  10. * -O Use TCP/IP fingerprinting to guess remote operating system
  11.   -p <range> ports to scan.  Example range: '1-1024,1080,6666,31337'
  12.   -F Only scans ports listed in nmap-services
  13.   -v Verbose. Its use is recommended.  Use twice for greater effect.
  14.   -P0 Don't ping hosts (needed to scan www.microsoft.com and others)
  15. * -Ddecoy_host1,decoy2[,...] Hide scan using many decoys
  16.  -T <Paranoid|Sneaky|Polite|Normal|Aggressive|Insane> General timing policy
  17.  -n/-R Never do DNS resolution/Always resolve [default: sometimes resolve]
  18.  -oN/-oX/-oG <logfile> Output normal/XML/grepable scan logs to <logfile>
  19.  -iL <inputfile> Get targets from file; Use '-' for stdin
  20. * -S <your_IP>/-e <devicename> Specify source address or network interface
  21.  --interactive Go into interactive mode (then press h for help)
  22. Example: nmap -v -sS -O www.my.com 192.168.0.0/16 '192.88-90.*.*'
  23. SEE THE MAN PAGE FOR MANY MORE OPTIONS, DESCRIPTIONS, AND EXAMPLES

Raw Paste


Login or Register to edit or fork this paste. It's free.