| -sP | 10.1.1.0/24 | find live hosts on subnet (PING) |
| -sT -p 80,445,8080 | 10.10.10.0/24 | find open tcp ports |
| -sU -p 500,4500 | 192.168.10.10 | udp port scan |
| -sS -p 80,445,22 | 192.169.0.0/24 | stealthy port scan (SYN) |
| -O | 192.168.4.5 | OS detection |
| -A | 10.10.10.10 | OS detect, ver.detect, traceroute |
| -sS -D | 10.5.5.5 10.10.5.9 | Decoy |
| –script vuln | 192,170.34.90 | vulnerability |
| -sA | | ACK scan |
| -sF | | FIN scan |
| -sL | | DNS scan |
| -sN | | NULL scan |
| -sO | | Protocol scan |
| -sR | | RPC scan |
| -sW | | Window scan |
| -sX | | XMAS scan |
| -PI | | ICMP ping |
| -PO | | NO PING |
| -PS | | SYN ping |
| -PT | | TCP ping |
| | |
| | |
| | |
Posted by: lesorsier on
12/10/2020
Tags: commands, nmap, scan, tcp, udp
Leave a Reply