[go: up one dir, main page]

0% found this document useful (0 votes)
47 views2 pages

Comprehensive Nmap Scanning Guide

The document provides examples of Nmap commands for scanning ports and services on a target IP address. It includes commands for comprehensive scanning of TCP and UDP ports, SSL/TLS scanning, OS detection, and vulnerability scanning.

Uploaded by

subodh yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views2 pages

Comprehensive Nmap Scanning Guide

The document provides examples of Nmap commands for scanning ports and services on a target IP address. It includes commands for comprehensive scanning of TCP and UDP ports, SSL/TLS scanning, OS detection, and vulnerability scanning.

Uploaded by

subodh yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

sudo nmap -p 1-65535 -T4 -A -v 115.112.148.

68
Intense scan all tcp ports(cross checked Certifacte expiry)

sudo nmap -sS -sU -T4 -A -v 115.112.148.68


intense scan all udp ports

nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 --script
"default or (discovery and safe)" 115.112.148.68
comperhensive scan

sudo nmap -sV -p 443 -T5 -v --script ssl-enum-ciphers.nse 115.112.148.68


cipher scan( ssl scan)

sudo nmap -sW 115.112.148.68 -p 443 --script ssl-enum-ciphers.nse


(if cipher scan command didnt work we can run this command)

sudo nmap -sX -v 115.112.148.68

nmap -sT -Pn -n --open 115.112.148.68


(basic port scanning)

sudo nmap -Pn --script ssl-enum-ciphers 115.112.148.70


(TLS version)

nmap -sT -Pn -n --open <IP>

nmap -sT -Pn -n --open <IP> -sV -p53,88,135,139,389,445,464,593,636,3268,3269,3389

nmap -sUV -F <IP or URL>


nmap -sU -T4 <IP or URL>
nmap -sUV -T4 -F --version-intensity 0 <IP or URL>

UDP related scan( Ports,state.which udp open it wil show


nmap -p 123 -sU 115.112.148.64

UDP realted
nmap -sU -pU:123 -Pn -n --max-retries=0 115.112.148.64

UPD related
nmap -sU -T4 115.112.148.64

sudo nmap -sV -Pn --script http-csrf 115.112.148.64

nmap -sV --script vulscan --script-args vulscandb=exploit.csv <target> -p 80,233

sudo nmap -sV --script vulscan 115.112.148.66

nmap --script nmap-vulners/ -sV <IP>

sudo nmap -A 115.112.148.68


common scan

Port Scanning
nmap -sS 115.112.148.68

Host Scanning
nmap -sp 115.112.148.68

OS Scanning
nmap -O 115.112.148.68

Scan The Most Popular Ports


nmap --top-ports S 115.112.148.68
nmap --top-ports 20 115.112.148.68

Output to a File
-oN output.txt

For Ex: nmap -sp 115.112.148.68 -oN [Provide Folder


Path]kali/home/Desktop/output.txt

FTP Scanning:
nmap -p 22,25,135 -Pn -v -b 121.242.140.150

nmap -p 22,25,135 -Pn -v -b 115.112.148.70

nmap -sV -sC -Pn 121.242.140.150 -vv

-sV
nmap -sV <IPADD>

-A
nmap -A <IPADD>

-sX
sudo nmap -sX <IPADD>

-sM
sudo nmap -sM <IPADD>

-sW
sudo nmap -sW <IPADD>

-sV --spoof
nmap -sv --spoof <217.110.30.250>
Instead of original ip, provide next family ip in the same subnet.

You might also like