tldr/pages/common/nmap.md

29 lines
847 B
Markdown
Raw Normal View History

2014-02-02 09:57:44 +00:00
# nmap
2015-12-29 15:28:01 +00:00
> Network exploration tool and security / port scanner.
> Some features only activate when Nmap is run with privileges.
2014-02-02 09:57:44 +00:00
- Try to determine whether the specified hosts are up and what are their names:
2014-02-02 09:57:44 +00:00
2015-12-29 15:28:01 +00:00
`nmap -sn {{ip_or_hostname}} {{optional_another_address}}`
2014-02-02 09:57:44 +00:00
- Like above, but also run a default 1000-port TCP scan if host seems up:
2014-02-02 09:57:44 +00:00
2015-12-29 15:28:01 +00:00
`nmap {{ip_or_hostname}} {{optional_another_address}}`
2015-12-29 00:34:45 +00:00
- Also enable service detection, OS fingerprinting and traceroute:
2015-12-29 00:34:45 +00:00
2015-12-29 15:28:01 +00:00
`nmap -A {{address_or_addresses}}`
2015-12-29 00:34:45 +00:00
2015-12-29 15:28:01 +00:00
- Assume good network connection and speed up execution:
2015-12-29 00:34:45 +00:00
2015-12-29 15:28:01 +00:00
`nmap -T4 {{address_or_addresses}}`
- Scan a specific list of ports (use -p- for all ports 1-65535):
2015-12-29 15:28:01 +00:00
`nmap -p {{port1,port2,...,portN}} {{address_or_addresses}}`
- Perform TCP and UDP scanning (use -sU for UDP only, -sZ for SCTP, -sO for IP):
`nmap -sSU {{address_or_addresses}}`