Nmap: Difference between revisions
(Created page with "==Basic== ===Scan 100 most common ports (fast)=== nmap -F [ip|hostname] ===Scan a single port=== Add `-sV` to detect what service is running on the specified port. ====UDP==== nmap -sU -p [port#] [ip|hostname] ====TCP==== nmap -sT -p [port#] [ip|hostname] ===Scan a range of ports=== nmap -p 80-81 [ip|hostname] ==Advanced== ===OS and version detection, script scanning, and traceroute=== *This will likely be detected by an IDS/IPS* nmap -A -T4 [ip|hostna...") |
No edit summary |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
==Summary== | |||
Nmap (short for "Network Mapper") is a powerful open-source tool used for network discovery and security auditing. It is widely utilized by network administrators, cybersecurity professionals, and penetration testers to gather information about networked devices and diagnose network issues. Nmap is available for multiple platforms, including Windows, macOS, and Linux. | |||
==Basic== | ==Basic== | ||
Line 25: | Line 29: | ||
===OS and version detection, script scanning, and traceroute=== | ===OS and version detection, script scanning, and traceroute=== | ||
{{Warn|This will likely be detected by an IDS/IPS}} | |||
nmap -A -T4 [ip|hostname] | nmap -A -T4 [ip|hostname] |
Latest revision as of 15:56, 21 January 2025
Summary
Nmap (short for "Network Mapper") is a powerful open-source tool used for network discovery and security auditing. It is widely utilized by network administrators, cybersecurity professionals, and penetration testers to gather information about networked devices and diagnose network issues. Nmap is available for multiple platforms, including Windows, macOS, and Linux.
Basic
Scan 100 most common ports (fast)
nmap -F [ip|hostname]
Scan a single port
Add `-sV` to detect what service is running on the specified port.
UDP
nmap -sU -p [port#] [ip|hostname]
TCP
nmap -sT -p [port#] [ip|hostname]
Scan a range of ports
nmap -p 80-81 [ip|hostname]
Advanced
OS and version detection, script scanning, and traceroute
Warning: This will likely be detected by an IDS/IPS
nmap -A -T4 [ip|hostname]
Firewall Audit (from another machine)
2020-06-07 - I don't think this is right...need to find a better command
nmap –v –sA –n [ip|hostname] –oA [output-filename]