HiveBrain v1.2.0
Get Started
← Back to all entries
snippetbashTip

nmap — Network exploration tool and security/port scanner. Some features (e.g. SYN scan) activate only when

Submitted by: @import:tldr-pages··
0
Viewed 0 times
nmapcommandexplorationsecurityandnetworkclitool

Problem

How to use the nmap command: Network exploration tool and security/port scanner. Some features (e.g. SYN scan) activate only when nmap is run with root privileges. See also: hping3, masscan, naabu, rustscan, zmap. More information: <https://nmap.org/book/man.html>.

Solution

nmap — Network exploration tool and security/port scanner. Some features (e.g. SYN scan) activate only when nmap is run with root privileges. See also: hping3, masscan, naabu, rustscan, zmap. More information: <https://nmap.org/book/man.html>.

Scan the top 1000 ports of a remote host with various [v]erbosity levels:
nmap -v{{1|2|3}} {{ip_or_hostname}}


Run a ping sweep over an entire [s]ub[n]et or individual hosts very aggressively:
nmap -T5 -sn {{192.168.0.0/24|ip_or_hostname1,ip_or_hostname2,...}}


Enable OS detection, version detection, script scanning, and traceroute of hosts from a file:
sudo nmap -A -iL {{path/to/file.txt}}


Scan a specific list of [p]orts (use -p- for all ports from 1 to 65535):
nmap -p {{port1,port2,...}} {{ip_or_host1,ip_or_host2,...}}


Perform service and version detection of the top 1000 ports using default NSE scripts, writing results (-oA) to output files:
nmap -sC -sV -oA {{top-1000-ports}} {{ip_or_host1,ip_or_host2,...}}


Scan target(s) carefully using default and safe NSE scripts:
nmap --script "default and safe" {{ip_or_host1,ip_or_host2,...}}


Scan for web servers running on standard [p]orts 80 and 443 using all available http-* NSE scripts:
nmap --script "http-*" {{ip_or_host1,ip_or_host2,...}} -p 80,443


Attempt evading IDS/IPS detection by using an extremely slow scan (-T0), [D]ecoy source addresses, [f]ragmented packets, random data and other methods:
sudo nmap -T0 -D {{decoy_ip1,decoy_ip2,...}} --source-port {{53}} -f --data-length {{16}} -Pn {{ip_or_host}}

Code Snippets

Scan the top 1000 ports of a remote host with various [v]erbosity levels

nmap -v{{1|2|3}} {{ip_or_hostname}}

Run a ping sweep over an entire [s]ub[n]et or individual hosts very aggressively

nmap -T5 -sn {{192.168.0.0/24|ip_or_hostname1,ip_or_hostname2,...}}

Enable OS detection, version detection, script scanning, and traceroute of hosts from a file

sudo nmap -A -iL {{path/to/file.txt}}

Scan a specific list of [p]orts (use `-p-` for all ports from 1 to 65535)

nmap -p {{port1,port2,...}} {{ip_or_host1,ip_or_host2,...}}

Perform service and version detection of the top 1000 ports using default NSE scripts, writing results (`-oA`) to output files

nmap -sC -sV -oA {{top-1000-ports}} {{ip_or_host1,ip_or_host2,...}}

Context

tldr-pages: common/nmap

Revisions (0)

No revisions yet.