Log of E
Spectator-mode Notepad
NMAP Reference
- nmap -sP : Simple ping scan to check host availability without port scanning.
- nmap -F : Fast scan of the 100 most common ports for a quick vulnerability assessment.
- nmap -sV : Service version scan to determine the version of services running on each port, great for OS and app fingerprinting.
- nmap -A : Aggressive scan combining OS detection, version detection, script scanning, and traceroute.
- nmap -sn : ICMP ping scan to discover hosts without port scanning.
- nmap -sT : TCP connect scan to check if ports are open by completing the 3-way handshake.
- nmap -sU : UDP scan to find open UDP ports, useful for services like DNS and SNMP.
- nmap -p- : Scan all ports (1-65535) on a target for comprehensive port scanning.
- nmap -O : Enable OS detection to determine the operating system running on the target host.
- nmap -sS : SYN scan to send SYN packets and analyze the responses to determine open ports.
- nmap -sX : XMAS scan to send TCP packets with the FIN, PSH, and URG flags set, useful for firewall evasion.
- nmap -sC : Scan with default scripts enabled to perform advanced vulnerability scanning and service detection.
- nmap -v : Verbose output to provide more detailed information during the scan.
- nmap -T<0-5> : Settiming template for the scan (higher is faster but less reliable).
- nmap -iL : Read targets from a file to perform scans.
Further reading: “Nmap Network Scanning” by Gordon “Fyodor” Lyon