Nmap Syntax
[Link] an IP
Syntax: nmap <target-ip>
[Link] a HOST
Syntax: nmap <[Link]>
[Link] a range of IPs
Syntax: nmap <ip-address-range>
[Link] a Subnet
Syntax: nmap <ip-address/24>
[Link] a Targets from a Text File
Syntax: nmap -iL <[Link]>
[Link] target & Ignore Discovery
Syntax: nmap -target-ip <-Pn>
[Link] target & Host Discovery
Syntax: nmap -target-ip <-sP>
[Link] a Single Port
Syntax: nmap <target-ip> <-p port numbers>
[Link] a range of ports
Syntax: nmap <target-ip> <-p firstport-lastport>
[Link] all ports (65535)
Syntax: nmap <target-ip><-p->
[Link] TCP or UDP Ports
Syntax: nmap <target-ip><-p U:port, T:port>
[Link] Port Scan
Syntax: nmap <target-ip><-F> -v
[Link] Randomise Port Scan
Syntax: nmap <target-ip><-r> -v
[Link] Top Ports Scan
Syntax: nmap <target-ip><—top-ports N> -v
[Link] Port Ratio Scan
Syntax: nmap <target-ip><—ports-ratio > -v
[Link]-knocking an obfuscation-as-security technique.
Syntax: for x in 1-10000; do nmap -Pn -p $x server_ip_address;
done
[Link] Service Detection
Syntax: nmap <target-ip><-sV>
[Link] Service Detection
Syntax: nmap <target-ip><-sV —version-intensity 0>
[Link] Service Detection
Syntax: nmap <target-ip><-sV —version-intensity 5>
[Link] Detection
Syntax: nmap <target-ip> <-O >
[Link] Detection
Syntax: nmap <target-ip> <—max-os-tries>
[Link] Detection
Syntax: nmap <target-ip><—osscan-limit >
[Link] Detection
Syntax: nmap <target-ip><—osscan-guess; —fuzzy >
[Link] Detection
Syntax: nmap <target-ip><—script —smb-os-discovery >
[Link] Normal Output to File
Syntax: nmap <target-ip><-oN [Link]>
[Link] XML Output to File
Syntax: nmap <target-ip><-oX [Link]>
[Link] XML to CSV for Recon
Syntax: nmap <target-ip><-oX [Link]>
• Python [Link] [Link] [Link]
[Link] “Grep”able Output to File
Syntax: nmap <target-ip><-oG [Link]>
[Link] K1dd3 Output to File
Syntax: nmap <target-ip><-oS [Link]>
[Link] All Types Output to File
Syntax: nmap <target-ip><-oA [Link]>
[Link] using Default Safe Scripts
Syntax: nmap <target-ip><-sC>
[Link] Help for any Scripts
Syntax: nmap <target-ip><—script-help=scriptname>
[Link] Script Args
Syntax: nmap <target-ip><—script=scriptname —scriptargs>
[Link] using specific Scripts
Syntax: nmap <target-ip><—script=script [Link]>
[Link] using set of Scripts
Syntax: nmap <target-ip><—script=“http-*”>
[Link] Script Database
Syntax: nmap <target-ip><—script=updatedb>
[Link] Scripts
Syntax: nmap <target-ip><—script=safe,default>
[Link] Scripts
Syntax: nmap <target-ip><—script=vuln>
[Link] Scripts
Syntax: nmap <target-ip><—script=dos>
[Link] Scripts
Syntax: nmap <target-ip><—script=exploit>
[Link] Scripts
Syntax: nmap <target-ip><—script=http-malware-host>
[Link] Scripts
Syntax: nmap <target-ip><—script=intrusive>
[Link] including Scripts
Syntax: nmap <target-ip><—script=not script type>
[Link] Expression Scan
Syntax: nmap <target-ip><—script=and or not script type>
[Link] Scan
Syntax: nmap <target-ip><—traceroute>
[Link] Traffic & Geo Resolution Scan
Syntax: nmap <target-ip><—script=traceroutegeolocation>
[Link] BruteForce Scan
Syntax: nmap <target-ip><—script=[Link]>
[Link] Hosts on IP Scan
Syntax: nmap <target-ip> <—script=[Link]>
[Link] Scan
Syntax: nmap <target-ip><—script=whois-ip, whoisdomain>
[Link] Scan
Syntax: nmap <target-ip><—script=[Link]>
[Link] Detect Scan
Syntax: nmap <target-ip><—script=http-waf-detect>
[Link] Fingerprint Scan
Syntax: nmap <target-ip><—script=http-waf-fingerprint>
53.Wafw00f vs Nmap Scan
Syntax: wafw00f <[Link]>
Syntax: nmap <target-ip><—script=http-waf-fingerprint>
[Link] Scan
Syntax: nmap <target-ip><—script=firewalk —traceroute>
[Link] Scan
Syntax: nmap <target-ip><—script=shodan-api>
[Link] Enumeration
Syntax: nmap <target-ip><—script=http-grep>
[Link] Crawlers Scan
Syntax: nmap <target-ip><—script=http-useragent-tester>
[Link] Discovering Directories Scan
Syntax: nmap <target-ip><—script=http-enum>
[Link] Open Relay Scan
Syntax: nmap <target-ip><—script=smtp-open-relay>
[Link] SMTP User Enum Scan
Syntax: nmap <target-ip><—script=smtp-enum-users>
[Link] SMTP Password Attack Scan
Syntax: nmap <target-ip><—script=smtp-brute>
[Link] SMTP Backdoor Detect Scan
Syntax: nmap <target-ip><—script=smtp-strangeport>
[Link] POP3 Capabilities Scan
Syntax: nmap <target-ip><—script=pop3-capabilities>
[Link] IMAP Capabilities Scan
Syntax: nmap <target-ip><—script=imap-capabilities>
[Link] Cloak Scan with Decoy
Syntax: nmap <target-ip><-D>
[Link] Spoof Mac Address
Syntax: nmap <target-ip><—spoof-mac>
[Link] Select Interface
Syntax: nmap <target-ip><-e ethO>
[Link] Source Port Modify
Syntax: nmap <target-ip><—source-port 7890>
[Link] Fake TTL
Syntax: nmap <target-ip><—ttl 128>
[Link] Relay Proxies
Syntax: nmap <target-ip><—proxies proxy:port>
[Link] Bogus TCP/UDP Checksum
Syntax: nmap <target-ip><—badsum>
[Link] Bogus Fragment Scan
Syntax: nmap <target-ip> <-f>
[Link] MTU Scan
Syntax: nmap <target-ip><-mtu 8>