NETWORK SCANNING
Welcome Back!, In the previous blog we talked about the introduction of Nmap. here today we shall discuss the Network scanning techniques in Nmap.
Basic Syntax
nmap [ <Scan Type> ...] [ <Options> ] { <target specification> }
Nmap Usage
Single Scan
nmap [target] ex: nmap 198.43.12.xx
Multi-Scan
nmap [target1, target2, etc] ex: nmap 198.43.12.xx, 198.43.12.xx
Scan a List of Targets
PORT SCANNING OPTIONS
Single Command
nmap -F [target]
Scan All ports
nmap -p 1-65535 [target]
Scan Top Ports
nmap --top-ports [number] [target]
Detecting Unknown OS
nmap -O --osscan-guess [target]
Conclusion
As we have all seen the few commands on how to use Nmap to scan targets & ports, in the next blog we shall see more indepth of this Powerful software/tool.
Nmap Scan Descriptions
| Nmap Switch | Description |
|---|---|
| -sA | ACK scan |
| -sF | FIN scan |
| -sI | IDLE scan |
| -sL | DNS scan (a.k.a. list scan) |
| -sN | NULL scan |
| -sO | Protocol scan |
| -sP | Ping scan |
| -sR | RPC scan |
| -sS | SYN scan |
| -sT | TCP connect scan |
| -sW | Windows scan |
| -sX | XMAS scan |
hi

.png)