Nmap is a powerful network exploration and security auditing tool that offers a wide range of scanning and detection options. Here are some of the most commonly used Nmap commands:
1. Basic Nmap Scan:
To perform a basic Nmap scan, use the following command:
```
nmap <target>
```
where <target> is the IP address or hostname of the target you want to scan. This command will perform a TCP SYN scan on the 1,000 most common ports.
2. Scanning a Specific Port:
To scan a specific port, use the following command:
```
nmap -p <port> <target>
```
where <port> is the port number you want to scan, and <target> is the IP address or hostname of the target you want to scan. This command will perform a TCP SYN scan on the specified port.
3. Scan a Range of Ports:
To scan a range of ports, use the following command:
```
nmap -p <start-port>-<end-port> <target>
```
where <start-port> is the first port in the range, <end-port> is the last port in the range, and <target> is the IP address or hostname of the target you want to scan.
4. Aggressive Scan:
To perform an aggressive scan, use the following command:
```
nmap -A <target>
```
This command will perform a TCP SYN scan on all ports, OS detection, version detection, script scanning, and traceroute.
5. Detecting Operating System:
To detect the operating system of a target, use the following command:
```
nmap -O <target>
```
This command will perform an OS detection scan and attempt to determine the operating system of the target.
6. Scan for Vulnerabilities:
To scan for known vulnerabilities on a target, use the following command:
```
nmap --script=vuln <target>
```
This command will perform a vulnerability scan on the target using Nmap's built-in scripts.
7. Scan Multiple Targets:
To scan multiple targets, use the following command:
```
nmap <target1> <target2> <target3>
```
This command will scan multiple targets simultaneously.
These are just a few of the many Nmap commands available. It is important to use Nmap responsibly and ethically and to ensure that the tool is used for legitimate purposes only.

No comments:
Post a Comment