Nmap usage basic samples. Nmap is a scanning tool used by penetration testers. In this article, we have a couple of samples similar to a cheat sheet.
##** SCAN ONLY YOUR OWN HOSTS AND SERVERS !!! **## ## Scanning Networks is your own responsibility ## # Syn Scan - Half Open Scanning (root only) nmap -sS 192.168.0.1 # Connect Scan nmap -sT 192.168.0.1 # Scanning all ports (0-65535) nmap -p- 192.168.0.1 # Specifying the ports to scan nmap -p 20,22-100,443,1000-2000 192.168.0.1 # Scan Version nmap -p 22,80 -sV 192.168.0.1 # Ping scanning (entire Network) nmap -sP 192.168.0.0/24 # Treat all hosts as online -- skip host discovery nmap -Pn 192.168.0.101 # Excluding an IP nmap -sS 192.168.0.0/24 --exclude 192.168.0.10 # Saving the scanning report to a file nmap -oN output.txt 192.168.0.1 # OS Detection nmap -O 192.168.0.1 # Enable OS detection, version detection, script scanning, and traceroute nmap -A 192.168.0.1 https://nmap.org/book/performance-timing-templates.html -T paranoid|sneaky|polite|normal|aggressive|insane (Set a timing template) # -A OS and service detection with faster execution nmap -A -T aggressive cloudflare.com # Using decoys to evade scan detection nmap -p 22 -sV 192.168.0.101 -D 192.168.0.1,192.168.0.21,192.168.0.100 # reading the targets from a file (ip/name/network separeted by a new line or a whitespace) nmap -p 80 -iL hosts.txt # exporting to out output file and disabling reverse DNS nmap -n -iL hosts.txt -p 80 -oN output.txt