nmap -oA nmap-full -Pn -sS -T4 -p- --defeat-rst-ratelimit <IP>
nmap -oA nmap-vuln -Pn -script vuln -p <Port,Port,Port,...> <IP>
sudo nmap -oA --nmap-full -sS -sC -sV -p- --defeat-rst-ratelimit <target-IP>
searchsploit --nmap ./nmap-full.xml --verbose
nmap --script http-wordpress-enum --scripts-args check-latest=true,search-limit=1500 -p 80 test.com
nmap -iL <ListofHosts>
nmap -sL -n 10.10.0.0/16
nmap -PR -sn 192.168.0.0/24
nmap -PE -sn 10.10.0.0/16
nmap -PP -sn 10.10.0.0/16
nmap -PM -sn 10.10.0.0/16
-PS23
Syn on port 23-PA80-8080
ACK on port range 80-8080-sN
, port is open when there is no response. Otherwise the response is RST/ACK
-sF
, same procedure as null scan.-sX
, FIN/PSH/URG
is sent. RST/ACK
when port is closed.-sM
, sends FIN/ACK
. Packet is dropped when port is open. Only viable on old BSD networks.-sA
, sends ACK
. Receives RST
regardless of the state of the port. May be used to explore firewall rules.-sW
, sends ACK
, and receives RST
as well. Inspects the window part of the response. Used to expose firewall rules.--scanflags RSTACKFIN
, set flags randomly.-PU
-n
-R
-sn
-S <spoofed-IP>
--spoof-mac <spoofed-MAC>
-Pn
-D <decoy-IP>,<decoy-IP>,<decoy-IP>,RND,RND,ME
-sV
--version-intensity <level 0-9>
--version-light
--version-all
Installed at /usr/share/nmap/scripts
* auth Authentication related scripts
* broadcast Discover hosts by sending broadcast messages
* brute Performs brute-force password auditing against logins
* default Default scripts, same as -sC
* discovery Retrieve accessible information, such as database tables and DNS names
* dos Detects servers vulnerable to Denial of Service (DoS)
* exploit Attempts to exploit various vulnerable services
* external Checks using a third-party service, such as Geoplugin and Virustotal
* fuzzer Launch fuzzing attacks
* intrusive Intrusive scripts such as brute-force attacks and exploitation
* malware Scans for backdoors
* safe Safe scripts that won’t crash the target
* version Retrieve service versions
* vuln Checks for vulnerabilities or exploit vulnerable services
-F
--top-ports 100
-T0
RST/ACK
to a initial SYN
-r
, not random--min-rate
and --max-rate
--min-parallelism
and --max-parallelism
-f
8 bytes, -ff
16 bytes or --mtu
-sI <pwnd-device-IP>
via pwnd host inside the targets network--reason
, -d
, -vv
--traceroute