
Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Nmap commands with descriptions on Nmap scan types Reference, Nmap Scripting Engine, Nmap output Reference
Typology: Cheat Sheet
1 / 1
This page cannot be seen from the preview
Don't miss anything!
TCP connect() Scan [-sT] – full three-way handshake
[-sS] SYN Stealth Scan – sends SYN, waiting for SYN/ACK, sends RST sent to tear down before full connection establishment Response:
[-sF, - sN, - sX ] FIN, Null and Xmas Tree Scan – TCP header flags set, useful for IDS and FW detection evasion – never makes even part of a connection. Can be used to detect OS running. Response:
[-sP] Ping Scan - lists the hosts within the specified range that responded to a ping - detect computers online, rather than ports open. Methods:
[-P0] – disable ICMP scan type [-sU] UDP Scan - sends 0-byte UDP packets to each target port on the victim. a. ICMP Port Unreachable message received - port is closed, b. Otherwise – port is assumed open. [-sI] Idle Scanning - advanced, highly stealthed technique. No packets sent to the target which can be identified to originate from the scanning machine. A zombie host (and optionally port) must be specified for this scan type. Read more http://www.insecure.org/nmap/idlescan.html
[-sA] ACK Scan - used to map firewall rule sets, distinguish stateful/stateless firewalls, Response: a. RST - "unfiltered" (that is, it was allowed to send its RST through whatever firewall was in place). b. No response – "filtered" (firewall prevented the RST coming back from the port).
[-sW] TCP Window scan - similar to the ACK scan, can sometimes detect open ports as well as filtered/unfiltered ports due to anomalies in TCP Window size reporting by some operating.
[-sR] RPC Scan - used in conjunction with other scan types to try to determine if an open TCP or UDP port is an RPC service, and if so, which program, and version numbers are running on it. Decoys are not supported with RPC scans.
[-sL] List scan - prints a list of IPs and names WITHOUT actually pinging or scanning the hosts. DNS resolution will be used, disable it using the - n option.
[-sV] enables version detection – determine service/version info - critical in determining an entry point for an attack
[-O] enables OS fingerprinting
[-A] enables OS fingerprinting and version detection, script scanning and traceroute (and advanced feature added in new releases). Version detection details - http://www.insecure.org/nmap/vscan/
[-oN
[-T0] Paranoid: Very slow, used for IDS evasion [-T1] Sneaky: Quite slow, used for IDS evasion
[-T2] Polite: Slows down to consume less bandwidth, runs ~10 times slower than default [-T3] Normal: Default, a dynamic timing model based on target responsiveness [-T4] Aggressive: Assumes a fast and reliable network and may overwhelm targets [-T5] Insane: Very aggressive; will likely overwhelm targets or miss open ports
Default location of scripts available: [-sC] Run default scripts --script-updatedb Update script database
--script
specification} Ping scan
SYN scan discovered alive host
SYN scan of another host, with more information on output
Scan 100 most common ports of
Scan specific ports on target
Using scripting engine Scan using default safe scripts nmap -sV -sC
Scan using a specific NSE script
Scan for “Heartbleed” bulnerability
range>