Options Nmap
Options Nmap
Options Nmap
discovery and security auditing. It offers a wide range of options for scanning
hosts, ports, and services. Below is a list of common Nmap scan types and
other important options available in Nmap:
Scan Types:
o This is the most popular scan type because it is fast and stealthy.
It works by sending SYN packets (part of the TCP handshake) and
analyzing the response.
o A TCP scan that uses the TCP window size to determine the state
of the port. It is useful for stealth scanning but is less commonly
used.
o Sends FIN packets to the target and works by exploiting the fact
that closed ports will respond with an RST (reset) packet.
o Sends a packet with the FIN, PSH, and URG flags set. Some
firewalls will let the packet through, while others will drop it or
generate unusual responses.
o This scan does not actually send any packets to the target; it
only resolves hostnames for the given IP addresses.
o Similar to the -sY scan but specifically uses SCTP COOKIE ECHO
message for scanning.
Target Specification:
-p: Specifies which ports to scan (e.g., -p 80 for port 80, -p 1-1000 for
ports 1 through 1000, -p U:53,T:80 for UDP port 53 and TCP port 80).
-T: Timing template, controls the speed of the scan (e.g., -T4 for faster
scans).
-Pn: Skip host discovery and treat all targets as online (useful when
ICMP is blocked).
-O: OS detection.
-b: FTP bounce scan (uses a third-party machine to scan the target).
-D: Decoy scan (uses multiple decoys to disguise the real source of the
scan).
Additional Options:
-T0 to -T5: Timing templates that control the speed and stealth of the
scan. T0 is the slowest and stealthiest, while T5 is the fastest and
most aggressive.
Example Commands:
Conclusion:
Nmap offers a wide array of options for different types of scanning, from
basic port scanning to advanced techniques such as OS detection, service
version detection, and evading firewalls. The options above should give you
a comprehensive understanding of what can be done with Nmap.