nmap 192.168.1.0/24
: This scans the entire class C rangenmap -p <port ranges>
: This scans specific portsnmap -sP 192.168.1.0/24
: This scans the network/find servers and devices that are runningsudo nmap -sP 192.168.1.0/24
: Using sudo can be necessary on mac to get the MAC Adressnmap -O 192.168.1.1-42
: Scan from port 1 to 42nmap -O 192.168.1.150
:# Os detection with target ipnmap –iflist
: This shows host interfaces and routesnmap –sV 192.168.1.1
: This detects remote services' version numbersnmap –sS 192.168.1.1
: This performs a stealthy TCP SYN scannmap –sO 192.168.1.1
: This scans for the IP protocolnmap -192.168.1.1 > output.txt
: This saves the output from the scan to the text filenmap –sA 192.168.1.254
: This checks whether the host is protected by a firewallnmap –PN 192.168.1.1
: This scans the host when it is protected by a firewallnmap --reason 192.168.1.1
: This displays the reason a port is in a particular statenmap --open 192.168.1.1
: This only shows open or possibly open ports
Last active
October 19, 2018 09:10
-
-
Save ericfourrier/55db00bc92dd105ab126 to your computer and use it in GitHub Desktop.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment