Nmap: Difference between revisions

From Dave-Wiki
(Created page with "==Basic== ===Scan 100 most common ports (fast)=== nmap -F [ip|hostname] ===Scan a single port=== Add `-sV` to detect what service is running on the specified port. ====UDP==== nmap -sU -p [port#] [ip|hostname] ====TCP==== nmap -sT -p [port#] [ip|hostname] ===Scan a range of ports=== nmap -p 80-81 [ip|hostname] ==Advanced== ===OS and version detection, script scanning, and traceroute=== *This will likely be detected by an IDS/IPS* nmap -A -T4 [ip|hostna...")
 
No edit summary
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
==Summary==
Nmap (short for "Network Mapper") is a powerful open-source tool used for network discovery and security auditing. It is widely utilized by network administrators, cybersecurity professionals, and penetration testers to gather information about networked devices and diagnose network issues. Nmap is available for multiple platforms, including Windows, macOS, and Linux.
==Basic==
==Basic==


Line 25: Line 29:
===OS and version detection, script scanning, and traceroute===
===OS and version detection, script scanning, and traceroute===


*This will likely be detected by an IDS/IPS*
{{Warn|This will likely be detected by an IDS/IPS}}


  nmap -A -T4 [ip|hostname]
  nmap -A -T4 [ip|hostname]

Latest revision as of 15:56, 21 January 2025

Summary

Nmap (short for "Network Mapper") is a powerful open-source tool used for network discovery and security auditing. It is widely utilized by network administrators, cybersecurity professionals, and penetration testers to gather information about networked devices and diagnose network issues. Nmap is available for multiple platforms, including Windows, macOS, and Linux.

Basic

Scan 100 most common ports (fast)

nmap -F [ip|hostname]

Scan a single port

Add `-sV` to detect what service is running on the specified port.

UDP

nmap -sU -p [port#] [ip|hostname]

TCP

nmap -sT -p [port#] [ip|hostname]

Scan a range of ports

nmap -p 80-81 [ip|hostname]

Advanced

OS and version detection, script scanning, and traceroute

Note Warning:  This will likely be detected by an IDS/IPS


nmap -A -T4 [ip|hostname]

Firewall Audit (from another machine)

2020-06-07 - I don't think this is right...need to find a better command

nmap –v –sA –n [ip|hostname] –oA [output-filename]