Nmap Examples
Basic Nmap scanning examples, often used at the first stage of enumeration.
COMMAND | DESCRIPTION |
---|---|
| Ping scans the network, listing machines that respond to ping. |
| Full TCP port scan using with service version detection - usually my first scan, I find T4 more accurate than T5 and still "pretty quick". |
| Prints verbose output, runs stealth syn scan, T4 timing, OS and version detection + traceroute and scripts against target services. |
| Prints verbose output, runs stealth syn scan, T5 timing, OS and version detection + traceroute and scripts against target services. |
| Prints verbose output, runs stealth syn scan, T5 timing, OS and version detection. |
| Prints verbose output, runs stealth syn scan, T4 timing, OS and version detection + full port range scan. |
| Prints verbose output, runs stealth syn scan, T5 timing, OS and version detection + full port range scan. |
Nmap scan from file
COMMAND | DESCRIPTION |
---|---|
| Scans a list of IP addresses, you can add options before / after. |
Nmap output formats
COMMAND | DESCRIPTION |
---|---|
| Outputs "grepable" output to a file, in this example Netbios servers. E.g, The output file could be grepped for "Open". |
| Export nmap output to HTML report. |
Nmap Netbios Examples
COMMAND | DESCRIPTION |
---|---|
| Find all Netbios servers on subnet |
| Nmap display Netbios name |
| Nmap check if Netbios servers are vulnerable to MS08-067 |
Post a Comment