tools_syntax_nmap
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
tools_syntax_nmap [2022/09/24 20:51] – [Some Useful NSE Scripts] gman | tools_syntax_nmap [2022/09/25 14:37] (current) – removed gman | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Nmap: Scan Target IPs ====== | ||
- | |||
- | **Usage:** | ||
- | |||
- | < | ||
- | nmap [Scan Type(s)] [Options] {target specification} | ||
- | # need to run as root | ||
- | </ | ||
- | |||
- | **Standard Go-To Examples:** | ||
- | |||
- | < | ||
- | #TCP Ports: | ||
- | nmap -sS -T4 -p- -A [IP Address] | ||
- | |||
- | #UDP Ports: | ||
- | nmap -sU -T4 -A [IP Address] | ||
- | </ | ||
- | |||
- | The following is a list and description of the 30 most common basic commands in nmap (for beginners). | ||
- | * **Source:** [[https:// | ||
- | |||
- | ---- | ||
- | |||
- | ===== Target Selection ===== | ||
- | |||
- | ^ **#** ^ Title ^ Syntax ^ | ||
- | | 01 | Scan a single IP | '' | ||
- | | 02 | Scan a host | '' | ||
- | | 03 | Scan a range of IPs | '' | ||
- | | 04 | Scan a subnet | '' | ||
- | | 05 | Scan targets from text file | '' | ||
- | |||
- | ---- | ||
- | |||
- | ===== Port Selection ===== | ||
- | |||
- | ^ **#** ^ Title ^ Syntax ^ | ||
- | | 06 | Scan a single port| '' | ||
- | | 07 | Scan a range of ports| '' | ||
- | | 08 | Scan 100 common ports| '' | ||
- | | 09 | Scan all ports| '' | ||
- | | 10 | Specify UDP or TCP scan| '' | ||
- | |||
- | ---- | ||
- | |||
- | ===== Scan Types ===== | ||
- | |||
- | ^ **#** ^ Title ^ Syntax ^ | ||
- | | 11 | Scan using TCP connect| '' | ||
- | | 12 | Scan using TCP SYN scan| '' | ||
- | | 13 | Scan UDP ports| '' | ||
- | | 14 | Scan, Ignore Discovery (Ping not)| '' | ||
- | |||
- | ---- | ||
- | |||
- | ===== Service and OS Detection ===== | ||
- | |||
- | ^ **#** ^ Title ^ Syntax ^ | ||
- | | 15 | Detect OS and Services| '' | ||
- | | 16 | Standard service detection| '' | ||
- | | 17 | Aggressive service detection| '' | ||
- | |||
- | ---- | ||
- | |||
- | ===== Output Formats ===== | ||
- | |||
- | ^ **#** ^ Title ^ Syntax ^ | ||
- | | 18 | Save as normal file| '' | ||
- | | 19 | Save as XML| '' | ||
- | | 20 | Save as Grepable| '' | ||
- | | 21 | Save in all formats| '' | ||
- | |||
- | ---- | ||
- | |||
- | ===== Scripting Engine ===== | ||
- | |||
- | ^ **#** ^ Title ^ Syntax ^ | ||
- | | 22 | Scan using default safe scripts| '' | ||
- | | 23 | Get help for a script| '' | ||
- | | 24 | Scan using a specific script| '' | ||
- | | 25 | Update script database| '' | ||
- | |||
- | ---- | ||
- | |||
- | ===== Some Useful NSE Scripts ===== | ||
- | |||
- | ^ **#** ^ Title ^ Syntax ^ | ||
- | | 26 | Scan for UDP DDOS reflectors| '' | ||
- | | 27 | Gather page titles from HTTP Servers| '' | ||
- | | 28 | Get HTTP headers of web services| '' | ||
- | | 29 | Find web apps from known paths| '' | ||
- | | 30 | Find exposed Netbios servers| '' | ||
- | |||
- | ---- | ||
tools_syntax_nmap.1664052670.txt.gz · Last modified: by gman