<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://beardedmaker.com/wiki/index.php?action=history&amp;feed=atom&amp;title=Nmap</id>
		<title>Nmap - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://beardedmaker.com/wiki/index.php?action=history&amp;feed=atom&amp;title=Nmap"/>
		<link rel="alternate" type="text/html" href="https://beardedmaker.com/wiki/index.php?title=Nmap&amp;action=history"/>
		<updated>2026-04-27T00:00:31Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.4</generator>

	<entry>
		<id>https://beardedmaker.com/wiki/index.php?title=Nmap&amp;diff=142&amp;oldid=prev</id>
		<title>Beard: Created page with &quot;&lt;pre&gt; nmap:  -sS &lt;ip addr&gt;		TCP scan (ex 192.168.0.1-255/24) -sU &lt;ip addr&gt;		UDP scan -A			enable OS, version, script scanning, and traceroute -PN			treat all hosts as online -...&quot;</title>
		<link rel="alternate" type="text/html" href="https://beardedmaker.com/wiki/index.php?title=Nmap&amp;diff=142&amp;oldid=prev"/>
				<updated>2016-02-29T21:16:48Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;pre&amp;gt; nmap:  -sS &amp;lt;ip addr&amp;gt;		TCP scan (ex 192.168.0.1-255/24) -sU &amp;lt;ip addr&amp;gt;		UDP scan -A			enable OS, version, script scanning, and traceroute -PN			treat all hosts as online -...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
nmap:&lt;br /&gt;
&lt;br /&gt;
-sS &amp;lt;ip addr&amp;gt;		TCP scan (ex 192.168.0.1-255/24)&lt;br /&gt;
-sU &amp;lt;ip addr&amp;gt;		UDP scan&lt;br /&gt;
-A			enable OS, version, script scanning, and traceroute&lt;br /&gt;
-PN			treat all hosts as online&lt;br /&gt;
-F			fast mode&lt;br /&gt;
--exclude &amp;lt;host,host&amp;gt;	exclude hosts&lt;br /&gt;
-sL			simply list targets&lt;br /&gt;
-O			detect OS&lt;br /&gt;
--traceroute		trace hop path&lt;br /&gt;
-sV			scan for service version info&lt;br /&gt;
-p &amp;lt;port ranges&amp;gt;	only scan specified ports&lt;br /&gt;
-oN &amp;lt;file&amp;gt;		normal output to file&lt;br /&gt;
--open			only show open ports&lt;br /&gt;
&lt;br /&gt;
-f			fragment packets&lt;br /&gt;
-D &amp;lt;decoy,decoy,..&amp;gt;	use decoys 	ME(put after 6th position)&lt;br /&gt;
					RND:&amp;lt;#&amp;gt;(to make random # host})&lt;br /&gt;
					decoy hosts should be up!&lt;br /&gt;
-S &amp;lt;ip addr&amp;gt;		spoof source address&lt;br /&gt;
--spoof-mac &amp;lt;mac&amp;gt;	spoof mac address&lt;br /&gt;
-e &amp;lt;iface&amp;gt;		use specified interface&lt;br /&gt;
-g &amp;lt;port #&amp;gt;		use port #&lt;br /&gt;
--data-length &amp;lt;#&amp;gt;	append random data to packets&lt;br /&gt;
--randomize-hosts	randomize hosts that are being scanned&lt;br /&gt;
--badsum		send packets with bogus checksum&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Beard</name></author>	</entry>

	</feed>