[go: up one dir, main page]

100% found this document useful (1 vote)
1K views6 pages

Nmap Command Syntax Guide

The document outlines 73 different Nmap syntax commands for scanning targets and networks. It covers commands for scanning single IPs, ranges, subnets and hosts, as well as options for port scanning, service detection, OS detection, and NSE script scanning. The syntax shown provides the basic building blocks for customizing Nmap scans.

Uploaded by

Shakeel Amin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views6 pages

Nmap Command Syntax Guide

The document outlines 73 different Nmap syntax commands for scanning targets and networks. It covers commands for scanning single IPs, ranges, subnets and hosts, as well as options for port scanning, service detection, OS detection, and NSE script scanning. The syntax shown provides the basic building blocks for customizing Nmap scans.

Uploaded by

Shakeel Amin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Nmap Syntax

[Link] an IP
Syntax: nmap <target-ip>

[Link] a HOST
Syntax: nmap <​[Link]​>

[Link] a range of IPs


Syntax: nmap <ip-address-range>

[Link] a Subnet
Syntax: nmap <ip-address/24>

[Link] a Targets from a Text File


Syntax: nmap -iL <[Link]>

[Link] target & Ignore Discovery


Syntax: nmap -target-ip <-Pn>

[Link] target & Host Discovery


Syntax: nmap -target-ip <-sP>

[Link] a Single Port


Syntax: nmap <target-ip> <-p port numbers>

[Link] a range of ports


Syntax: nmap <target-ip> <-p firstport-lastport>

[Link] all ports (65535)


Syntax: nmap <target-ip><-p->

[Link] TCP or UDP Ports


Syntax: nmap <target-ip><-p U:port, T:port>

[Link] Port Scan


Syntax: nmap <target-ip><-F> -v
[Link] Randomise Port Scan
Syntax: nmap <target-ip><-r> -v

[Link] Top Ports Scan


Syntax: nmap <target-ip><—top-ports N> -v

[Link] Port Ratio Scan


Syntax: nmap <target-ip><—ports-ratio > -v

[Link]-knocking an obfuscation-as-security technique.


Syntax: for x in 1-10000; do nmap -Pn -p $x server_ip_address;
done

[Link] Service Detection


Syntax: nmap <target-ip><-sV>

[Link] Service Detection


Syntax: nmap <target-ip><-sV —version-intensity 0>

[Link] Service Detection


Syntax: nmap <target-ip><-sV —version-intensity 5>

[Link] Detection
Syntax: nmap <target-ip> <-O >

[Link] Detection
Syntax: nmap <target-ip> <—max-os-tries>

[Link] Detection
Syntax: nmap <target-ip><—osscan-limit >

[Link] Detection
Syntax: nmap <target-ip><—osscan-guess; —fuzzy >

[Link] Detection
Syntax: nmap <target-ip><—script —smb-os-discovery >

[Link] Normal Output to File


Syntax: nmap <target-ip><-oN [Link]>
[Link] XML Output to File
Syntax: nmap <target-ip><-oX [Link]>

[Link] XML to CSV for Recon


Syntax: nmap <target-ip><-oX [Link]>
• Python [Link] [Link] [Link]

[Link] “Grep”able Output to File


Syntax: nmap <target-ip><-oG [Link]>

[Link] K1dd3 Output to File


Syntax: nmap <target-ip><-oS [Link]>

[Link] All Types Output to File


Syntax: nmap <target-ip><-oA [Link]>

[Link] using Default Safe Scripts


Syntax: nmap <target-ip><-sC>

[Link] Help for any Scripts


Syntax: nmap <target-ip><—script-help=scriptname>

[Link] Script Args


Syntax: nmap <target-ip><—script=scriptname —scriptargs>

[Link] using specific Scripts


Syntax: nmap <target-ip><—script=script [Link]>

[Link] using set of Scripts


Syntax: nmap <target-ip><—script=“http-*”>

[Link] Script Database


Syntax: nmap <target-ip><—script=updatedb>

[Link] Scripts
Syntax: nmap <target-ip><—script=safe,default>

[Link] Scripts
Syntax: nmap <target-ip><—script=vuln>
[Link] Scripts
Syntax: nmap <target-ip><—script=dos>

[Link] Scripts
Syntax: nmap <target-ip><—script=exploit>

[Link] Scripts
Syntax: nmap <target-ip><—script=http-malware-host>

[Link] Scripts
Syntax: nmap <target-ip><—script=intrusive>

[Link] including Scripts


Syntax: nmap <target-ip><—script=not script type>

[Link] Expression Scan


Syntax: nmap <target-ip><—script=and or not script type>

[Link] Scan
Syntax: nmap <target-ip><—traceroute>

[Link] Traffic & Geo Resolution Scan


Syntax: nmap <target-ip><—script=traceroutegeolocation>

[Link] BruteForce Scan


Syntax: nmap <target-ip><—script=[Link]>

[Link] Hosts on IP Scan


Syntax: nmap <target-ip> <—script=[Link]>

[Link] Scan
Syntax: nmap <target-ip><—script=whois-ip, whoisdomain>

[Link] Scan
Syntax: nmap <target-ip><—script=[Link]>

[Link] Detect Scan


Syntax: nmap <target-ip><—script=http-waf-detect>
[Link] Fingerprint Scan
Syntax: nmap <target-ip><—script=http-waf-fingerprint>

53.Wafw00f vs Nmap Scan


Syntax: wafw00f <[Link]>
Syntax: nmap <target-ip><—script=http-waf-fingerprint>

[Link] Scan
Syntax: nmap <target-ip><—script=firewalk —traceroute>

[Link] Scan
Syntax: nmap <target-ip><—script=shodan-api>

[Link] Enumeration
Syntax: nmap <target-ip><—script=http-grep>

[Link] Crawlers Scan


Syntax: nmap <target-ip><—script=http-useragent-tester>

[Link] Discovering Directories Scan


Syntax: nmap <target-ip><—script=http-enum>

[Link] Open Relay Scan


Syntax: nmap <target-ip><—script=smtp-open-relay>

[Link] SMTP User Enum Scan


Syntax: nmap <target-ip><—script=smtp-enum-users>

[Link] SMTP Password Attack Scan


Syntax: nmap <target-ip><—script=smtp-brute>

[Link] SMTP Backdoor Detect Scan


Syntax: nmap <target-ip><—script=smtp-strangeport>

[Link] POP3 Capabilities Scan


Syntax: nmap <target-ip><—script=pop3-capabilities>

[Link] IMAP Capabilities Scan


Syntax: nmap <target-ip><—script=imap-capabilities>
[Link] Cloak Scan with Decoy
Syntax: nmap <target-ip><-D>

[Link] Spoof Mac Address


Syntax: nmap <target-ip><—spoof-mac>

[Link] Select Interface


Syntax: nmap <target-ip><-e ethO>

[Link] Source Port Modify


Syntax: nmap <target-ip><—source-port 7890>

[Link] Fake TTL


Syntax: nmap <target-ip><—ttl 128>

[Link] Relay Proxies


Syntax: nmap <target-ip><—proxies proxy:port>

[Link] Bogus TCP/UDP Checksum


Syntax: nmap <target-ip><—badsum>

[Link] Bogus Fragment Scan


Syntax: nmap <target-ip> <-f>

[Link] MTU Scan


Syntax: nmap <target-ip><-mtu 8>

You might also like