nmap -sP <target>: This command is used for host discovery and will ping the target system to determine if it is alive or not.
nmap -sS <target>: This command is used to perform a TCP SYN scan to determine which ports are open on the target system.
nmap -A <target>: This command is used for OS detection and version scanning of services running on the target system.
nmap -sV <target>: This command is used for version detection of services running on the target system.
nmap -sU <target>: This command is used to perform a UDP scan to determine which UDP ports are open on the target system.
nmap -O <target>: This command is used to perform an OS detection scan to determine the operating system of the target system.
nmap -p <port> <target>: This command is used to scan a specific port on the target system.
nmap -sT <target>: This command is used to perform a TCP connect scan to determine which ports are open on the target system.
nmap -sN <target>: This command is used to perform a TCP Null scan to determine which ports are open on the target system.
nmap -sF <target>: This command is used to perform a TCP FIN scan to determine which ports are open on the target system.
nmap -sX <target>: This command is used to perform a TCP Xmas scan to determine which ports are open on the target system.
nmap -sP -PS <target>: This command is used to perform a TCP SYN ping scan to determine which hosts are alive on the network.
nmap -sS -sU <target>: This command is used to perform a TCP SYN and UDP scan to determine which ports are open on the target system.
nmap -sV -sC <target>: This command is used to perform a version detection scan and run default scripts on open ports on the target system.
nmap -sU -p 123,161,162 <target>: This command is used to scan specific UDP ports (123, 161, and 162) on the target system.
nmap -Pn <target>: This command is used to skip host discovery and perform a port scan on the target system.
nmap -O -v <target>: This command is used to perform an OS detection scan with verbose output on the target system.
nmap -sA <target>: This command is used to perform a TCP ACK scan to determine which ports are filtered or unfiltered on the target system.
nmap -sY <target>: This command is used to perform a TCP SCTP scan to determine which ports are open on the target system.
nmap -sL <target>: This command is used to list all hosts on a network without scanning them.
It's important to note that some of these commands may require elevated privileges or may be considered intrusive, so it's important to obtain proper authorization before conducting any ethical hacking activities.
Comments
Post a Comment