nmap syntax commands


nmap port scanning

TCP Connect scanning for localhost and network 192.168.0.0/24

# nmap -v -sT localhost
# nmap -v -sT 192.168.0.0/24

nmap TCP SYN (half-open) scanning

# nmap -v -sS localhost
# nmap -v -sS 192.168.0.0/24

nmap TCP FIN scanning

 

# nmap -v -sF localhost
# nmap -v -sF 192.168.0.0/24

nmap TCP Windows scanning

 

# nmap -v -sW localhost
# nmap -v -sW 192.168.0.0/24

nmap TCP RPC scanning

 

# nmap -v -sR localhost
# nmap -v -sR 192.168.0.0/24

nmap UDP scanning

# nmap -v -O localhost
# nmap -v -O 192.168.0.0/24

nmap remote software version scanning

 

# nmap -v -sV localhost
# nmap -v -sV 192.168.0.0/24

[root@gtxash01 ~]# nmap -v -sP 10.10.22.0/24  | grep up   # Scans servers in entire 10.10.22.0 network

 

Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2010-10-14 06:10 CDT

DNS resolution of 53 IPs took 5.50s.

Host 10.10.22.0 seems to be a subnet broadcast address (returned 1 extra pings).

Host 10.10.22.1 appears to be up.

Host 10.10.22.2 appears to be up

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: