diff --git a/pages/common/nmap.md b/pages/common/nmap.md index a8861f0d4..4c13ea37d 100644 --- a/pages/common/nmap.md +++ b/pages/common/nmap.md @@ -1,19 +1,28 @@ # nmap -> Network exploration tool and security / port scanner +> Network exploration tool and security / port scanner. +> Some features only activate when Nmap is run with privileges. -- scan open ports of a single host +- Try to determine whether the specified hosts are up and what are their names. -`nmap {{192.168.0.1}}` +`nmap -sn {{ip_or_hostname}} {{optional_another_address}}` -- discover hosts in the 192.168.0.X area (no port scan) +- Like above, but also run a default 1000-port TCP scan if host seems up. -`nmap -sn {{192.168.0.1/24}}` +`nmap {{ip_or_hostname}} {{optional_another_address}}` -- faster scan of a single host (scans for common ports) +- Also enable service detection, OS fingerprinting and traceroute. -`nmap -F {{192.168.0.1}}` +`nmap -A {{address_or_addresses}}` -- faster scan of a subnet (scans for common ports) +- Assume good network connection and speed up execution: -`nmap -F {{192.168.0.1/24}}` +`nmap -T4 {{address_or_addresses}}` + +- Scan a specific list of ports (use -p- for all ports 1-65535) + +`nmap -p {{port1,port2,...,portN}} {{address_or_addresses}}` + +- Perform TCP and UDP scanning (use -sU for UDP only, -sZ for SCTP, -sO for IP): + +`nmap -sSU {{address_or_addresses}}`