Nmap

From TheBeard Science Project Wiki
Jump to: navigation, search
nmap:

-sS <ip addr>		TCP scan (ex 192.168.0.1-255/24)
-sU <ip addr>		UDP scan
-A			enable OS, version, script scanning, and traceroute
-PN			treat all hosts as online
-F			fast mode
--exclude <host,host>	exclude hosts
-sL			simply list targets
-O			detect OS
--traceroute		trace hop path
-sV			scan for service version info
-p <port ranges>	only scan specified ports
-oN <file>		normal output to file
--open			only show open ports

-f			fragment packets
-D <decoy,decoy,..>	use decoys 	ME(put after 6th position)
					RND:<#>(to make random # host})
					decoy hosts should be up!
-S <ip addr>		spoof source address
--spoof-mac <mac>	spoof mac address
-e <iface>		use specified interface
-g <port #>		use port #
--data-length <#>	append random data to packets
--randomize-hosts	randomize hosts that are being scanned
--badsum		send packets with bogus checksum