Nmap (Network Mapper) is a powerful open-source network scanning tool used for network discovery and security auditing. Here are ten commonly used Nmap commands to start with :
Basic Scan (TCP SYN Scan):
- This command performs a basic TCP SYN scan to identify open ports on a target system.
nmap -sS target_ip
TCP Connect Scan :
- This command uses a full TCP connection to check if a port is open or closed.
nmap -sT target_ip
UDP Scan:
- Use this command to perform a UDP scan to identify open UDP ports.
nmap -sU target_ip
OS Detection:
- Nmap can attempt to identify the operating system running on the target.
nmap -O target_ip
Service Version Detection: - This command detects the version of services running on open ports.
nmap -sV target_ip
Aggressive Scan:
- This command combines various scan techniques and is more intrusive.
nmap -A target_ip
Script Scanning:
- Nmap can run scripts to perform advanced tasks such as vulnerability scanning.
nmap -sC target_ip
Ping Scan:
- Use this command to perform a simple ping sweep to identify live hosts.
nmap -sn target_subnet
Fast Scan:
- This command performs a quick scan by skipping host discovery and only scanning specified ports.
nmap -F target_ip
Custom Port Range Scan:
- You can specify a custom range of ports to scan using this command.
nmap -p 80,443,8080 target_ip
Comments
Post a Comment