-->
BLANTERWISDOM101

cheat sheet for nmap

Wednesday, September 16, 2020

cheat sheet for Nmap - www.Techpedal.tech


Basic Scanning Techniques

  1. Scan a single target nmap (target)
  2. Scan multiple targets nmap (target1, target2, etc)
  3. Scan a list of targets nmap -iL (list.txt)
  4. Scan a range of hosts nmap (range of IP addresses)
  5. Scan an entire subnet nmap (IP address/cdir)
  6. Scan random hosts nmap -iR (number)
  7. Excluding targets from a scan nmap (targets) –exclude (targets)
  8. Excluding targets using a list nmap (targets) –excludefile (list.txt)
  9. Perform an aggressive scan nmap -A (target)
  10. Scan an IPv6 target nmap -6 (target)

Discovery Options

  1. Perform a ping scan only nmap -sP (target)
  2. Don’t ping nmap -PN (target)
  3. TCP SYN Ping nmap -PS (target)
  4. TCP ACK ping nmap -PA (target)
  5. UDP ping nmap -PU (target)
  6. SCTP Init Ping nmap -PY (target)
  7. ICMP echo ping nmap -PE (target)
  8. ICMP Timestamp ping nmap -PP (target)
  9. ICMP address mask ping nmap -PM (target)
  10. IP protocol ping nmap -PO (target)
  11. ARP ping nmap -PR (target)
  12. Traceroute nmap –traceroute (target)
  13. Force reverse DNS resolution nmap -R (target)
  14. Disable reverse DNS resolution nmap -n (target)
  15. Alternative DNS lookup nmap –system-dns (target)
  16. Manually specify DNS servers nmap –dns-servers (servers) (target)
  17. Create a host list nmap -sL (targets)

Firewall Evasion Techniques

  1. Fragment packets nmap -f (target)
  2. Specify a specific MTU nmap –mtu (MTU) (target)
  3. Use a decoy nmap -D RND: (number) (target)
  4. Idle zombie scan nmap -sI zombie) (target)
  5. Manually specify a source port nmap –source-port (port) (target)
  6. Append random data nmap –data-length (size) (target)
  7. Randomize target scan order nmap –randomize-hosts (target)
  8. Spoof MAC Address nmap –spoof-mac (MAC|0|vendor) (target)
  9. Send bad checksums nmap –badsum (target)

Version Detection

  1. Operating system detection nmap –O (target)
  2. Attempt to guess an unknown nmap -O –osscan-guess (target)
  3. Service version detection nmap -sV (target)
  4. Troubleshooting version scans nmap -sV –version-trace (target)
  5. Perform an RPC scan nmap -sR (target)

Output Options

  1. Save output to a text file nmap -oN (scan.txt) (target)
  2. Save output to a xml file nmap -oX (scan.xml) (target)
  3. Grepable output nmap -oG (scan.txt) (target)
  4. Output all supported file types nmap -oA (path/filename) (target)
  5. Periodically display statistics nmap –stats-every (time) (target)
  6. 133t output nmap -oS (scan.txt) (target)

Nmap Scripting Engine

  1. Execute individual scripts nmap –script (script.nse) (target)
  2. Execute multiple scripts nmap –script (expression) (target)
  3. Execute scripts by category nmap –script (cat) (target)
  4. Execute multiple scripts categories nmap –script (cat1, cat2,  etc)
  5. Troubleshoot scripts nmap –script [script] –script-trace (target)
  6. Update the script database nmap –script-updatedb

Share This :
Rajeshwaran

Rajeshwaran is a blogger who is always fascinated with technology and the amount of knowledge he can gather from the internet. He is trying to nerdify everyone around him with that same knowledge, through his writings. Website: Techpedal

0 Comments

:)
:(
hihi
:-)
:D
=D
:-d
;(
;-(
@-)
:P
:o
-_-
(o)
[-(
:-?
(p)
:-s
(m)
8-)
:-t
:-b
b-(
:-#
=p~
$-)
(y)
(f)
x-)
(k)
(h)
(c)
cheer
(li)
(pl)