Nmap

From TheBeard Science Project Wiki
Revision as of 17:16, 29 February 2016 by Beard (talk | contribs) (Created page with "<pre> nmap: -sS <ip addr> TCP scan (ex 192.168.0.1-255/24) -sU <ip addr> UDP scan -A enable OS, version, script scanning, and traceroute -PN treat all hosts as online -...")

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
nmap:

-sS <ip addr>		TCP scan (ex 192.168.0.1-255/24)
-sU <ip addr>		UDP scan
-A			enable OS, version, script scanning, and traceroute
-PN			treat all hosts as online
-F			fast mode
--exclude <host,host>	exclude hosts
-sL			simply list targets
-O			detect OS
--traceroute		trace hop path
-sV			scan for service version info
-p <port ranges>	only scan specified ports
-oN <file>		normal output to file
--open			only show open ports

-f			fragment packets
-D <decoy,decoy,..>	use decoys 	ME(put after 6th position)
					RND:<#>(to make random # host})
					decoy hosts should be up!
-S <ip addr>		spoof source address
--spoof-mac <mac>	spoof mac address
-e <iface>		use specified interface
-g <port #>		use port #
--data-length <#>	append random data to packets
--randomize-hosts	randomize hosts that are being scanned
--badsum		send packets with bogus checksum