Skip to content

Instantly share code, notes, and snippets.

@morteza-mori
Created July 3, 2017 07:40
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save morteza-mori/b2e3d64a3b8295a0400c7baa43514aa5 to your computer and use it in GitHub Desktop.
Save morteza-mori/b2e3d64a3b8295a0400c7baa43514aa5 to your computer and use it in GitHub Desktop.
nmap
NMAP
Ping with nmap
nmap -sP IP
Port state
nmap --reason HOST
TCP connect() scan—(Nmap -sT )
TCP SYN or half-open scan—(Nmap -sS )
TCP FIN, XMAS, and NULL scans—(Nmap -sF , -sX , -sN )
TCP ACK scan—(Nmap -sA )
TCP idle scan—(Nmap -sI )
UDP scan—(Nmap -sU )
Network interfaces
nmap --iflist
Network sweeping
nmap 192.168.1.* -p 80
Banner grabbing
nmap -sV HOST
Check the target is firewall protected or not
nmap -sA HOST
If yes
nmap -PN HOST
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment