-
Notifications
You must be signed in to change notification settings - Fork 2
/
NmapCommands
112 lines (78 loc) · 2.87 KB
/
NmapCommands
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
nmap scanme.nmap.org
//we are sending a package to the port and waiting for a response
//open means is active and open to connections
//closed it doesn't have any services running
//filtered it is protected by a firewall
//unfiltered not defined between closed or open
//it only scans the 1000 mos popular ports
nmap 192.168.0.106
//scan devices in your network
nmap 192.168.0.1-30
//scan all devices from 1 to 30
nmap 192.268.0.*
//scan an entire subnet, all devices from 0 to 255
nmap -iL targets.txt
//import file, import all targets that you want to scan from a file of ip addresses
nmap -A 45.33.32.156
//Agressive scan, it gives you more detailes like traceroute, operating systen, service version etc
nmap -O 45.33.32.156
//detects only the operating system
nmap --traceroute 45.33.32.156
//trace route from your computer to 45.33.32.156 (scanme.nmap.org) server,
//shows all the routers it used to get there (the path).
nmap -sV 45.33.32.156
//detects only the service version
nmap -F 45.33.32.156
//scans only the 100 most popular ports
nmap -p 20-25,80,443 45.33.32.156
//scan ports individualy or by range
//ports 20 to 20, port 80 and 443
nmap -p http,mysql 45.33.32.156
//scan ports by name
nmap -p- 45.33.32.156
//scan all ports 65,536
nmap --open 45.33.32.156
//scan only the open ports
nmap -F -oN Desktop/results.txt 45.33.32.156
//save results to a Normal file
nmap -F -oX Desktop/results.txt 45.33.32.156
//save results to a Xml file
nmap -v 45.33.32.156
//verbose of the scan (verbose means more till the scan happens information)
//Increase verbosity level use -vv or more for greater effect
nmap -d 45.33.32.156
//debugging of the scan
//Increase debugging level use -dd or more for greater effect
nmap --reason -p http 45.33.32.156
//displays the reason why a port is in the state that it is
nmap --packet-trace -p http 45.33.32.156
//shows all the packages send/recived
sudo nmap -sU 45.33.32.156
//UDP Scan
sudo nmap -sS 45.33.32.156
//TCP SYN Scan
nmap --top-ports 20 45.33.32.156
//scans top 20 (given number) ports
nmap -p 1-65535 -sV -sS -T4 45.33.32.156
//Full TCP port scan using with service version detection
nmap --min-rate 5000 45.33.32.156
//sends packages no slower than 5000 packages per second
nmap --max-rate 10000 45.33.32.156
//send packages no faster than 10000 packages per second
sudo nmap -sA 45.33.32.156
//ACK scan
sudo nmap -sO 45.33.32.156
//ip protocol scan
nmap -r 45.33.32.156
//Scan ports consecutively - don't randomize
nmap --port-ratio 0.2 45.33.32.156
//Scan ports more common than 0.2
//ratio should be between 0.0 and 1.0
nmap --version-intensity 4 45.33.32.156
//Set from 0 (light) to 9 (try all probes)
nmap --version-light 45.33.32.156
//Intensity 2, Limit to most likely probes
nmap --version-all 45.33.32.156
//Intensity 9, Try every single probe
nmap --version-trace 45.33.32.156
//Show detailed version scan activity (for debugging)