NETWORK SCANNING
Welcome Back!, In the previous blog we talked about the introduction of Nmap. here today we shall discuss the Network scanning techniques in Nmap.
Basic Syntax
nmap [ <Scan Type> ...] [ <Options> ] { <target specification> }
Nmap Usage
Single Scan
nmap [target] ex: nmap 198.43.12.xx
Multi-Scan
nmap [target1, target2, etc] ex: nmap 198.43.12.xx, 198.43.12.xx
Scan a List of Targets
PORT SCANNING OPTIONS
Single Command
nmap -F [target]
Scan All ports
nmap -p 1-65535 [target]
Scan Top Ports
nmap --top-ports [number] [target]
Detecting Unknown OS
nmap -O --osscan-guess [target]
Conclusion
As we have all seen the few commands on how to use Nmap to scan targets & ports, in the next blog we shall see more indepth of this Powerful software/tool.
Nmap Scan Descriptions
Nmap Switch | Description |
---|---|
-sA | ACK scan |
-sF | FIN scan |
-sI | IDLE scan |
-sL | DNS scan (a.k.a. list scan) |
-sN | NULL scan |
-sO | Protocol scan |
-sP | Ping scan |
-sR | RPC scan |
-sS | SYN scan |
-sT | TCP connect scan |
-sW | Windows scan |
-sX | XMAS scan |
hi