Skip to content

Instantly share code, notes, and snippets.

@ericfourrier
Last active October 19, 2018 09:10
Show Gist options
  • Save ericfourrier/55db00bc92dd105ab126 to your computer and use it in GitHub Desktop.
Save ericfourrier/55db00bc92dd105ab126 to your computer and use it in GitHub Desktop.
  • nmap 192.168.1.0/24: This scans the entire class C range
  • nmap -p <port ranges>: This scans specific ports
  • nmap -sP 192.168.1.0/24: This scans the network/find servers and devices that are running
  • sudo nmap -sP 192.168.1.0/24 : Using sudo can be necessary on mac to get the MAC Adress
  • nmap -O 192.168.1.1-42 : Scan from port 1 to 42
  • nmap -O 192.168.1.150 :# Os detection with target ip
  • nmap –iflist: This shows host interfaces and routes
  • nmap –sV 192.168.1.1: This detects remote services' version numbers
  • nmap –sS 192.168.1.1: This performs a stealthy TCP SYN scan
  • nmap –sO 192.168.1.1: This scans for the IP protocol
  • nmap -192.168.1.1 > output.txt: This saves the output from the scan to the text file
  • nmap –sA 192.168.1.254: This checks whether the host is protected by a firewall
  • nmap –PN 192.168.1.1: This scans the host when it is protected by a firewall
  • nmap --reason 192.168.1.1: This displays the reason a port is in a particular state
  • nmap --open 192.168.1.1: This only shows open or possibly open ports
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment