2013-08-22 03:34:11 +02:00
|
|
|
# Single target scan:
|
2013-08-14 07:41:17 +02:00
|
|
|
nmap [target]
|
|
|
|
|
2013-08-22 03:34:11 +02:00
|
|
|
# Scan from a list of targets:
|
2013-08-14 07:41:17 +02:00
|
|
|
nmap -iL [list.txt]
|
|
|
|
|
2013-08-22 03:34:11 +02:00
|
|
|
# iPv6:
|
2013-08-14 07:41:17 +02:00
|
|
|
nmap -6 [target]
|
|
|
|
|
2013-08-22 03:34:11 +02:00
|
|
|
# OS detection:
|
2013-08-14 07:41:17 +02:00
|
|
|
nmap -O [target]
|
|
|
|
|
2013-08-22 03:34:11 +02:00
|
|
|
# Save output to text file:
|
2013-08-14 07:41:17 +02:00
|
|
|
nmap -oN [output.txt] [target]
|
|
|
|
|
2013-08-22 03:34:11 +02:00
|
|
|
# Save output to xml file:
|
2013-08-14 07:41:17 +02:00
|
|
|
nmap -oX [output.xml] [target]
|
|
|
|
|
2013-08-22 03:34:11 +02:00
|
|
|
# Scan a specific port:
|
2013-08-14 07:41:17 +02:00
|
|
|
nmap -source-port [port] [target]
|
|
|
|
|
2013-08-22 03:34:11 +02:00
|
|
|
# Do an aggressive scan:
|
2013-08-14 07:41:17 +02:00
|
|
|
nmap -A [target]
|
|
|
|
|
2013-08-22 03:34:11 +02:00
|
|
|
# Traceroute:
|
2013-08-14 07:41:17 +02:00
|
|
|
nmap -traceroute [target]
|
|
|
|
|
2013-08-22 03:34:11 +02:00
|
|
|
# Ping scan only: -sP
|
|
|
|
# Don't ping: -PN
|
|
|
|
# TCP SYN ping: -PS
|
|
|
|
# TCP ACK ping: -PA
|
|
|
|
# UDP ping: -PU
|
|
|
|
# ARP ping: -PR
|
2013-10-09 00:16:31 +02:00
|
|
|
|
|
|
|
# Example: Ping scan all machines on a class C network
|
|
|
|
nmap -sP 192.168.0.0/24
|