nmap nmap scanme.nmap.org<\/pre>\nScan Targets from a File<\/p>\n
namp -iL targets.txt<\/pre>\nExclude the Listed Host from the Target Range<\/p>\n
nmap --exclude 192.168.1.5 192.168.1.1-10<\/pre>\nHost Discovery<\/strong><\/h5>\nTo List given targets only, no Scan<\/p>\n
nmap -sL 192.168.1.1-3<\/pre>\nTo Disable Port Scanning, Host Discovery only<\/p>\n
nmap -sn 192.168.1.1\/24<\/pre>\nTo Disable Host Discovery. Port scan only<\/p>\n
nmap -Pn 192.168.1.1-5<\/pre>\nTCP SYN discovery on given port<\/p>\n
nmap -PS 80,21 192.168.1.1<\/pre>\nTCP ACK discovery on given port<\/p>\n
nmap -PA 80,21 192.168.1.1<\/pre>\nUDP discovery on given port<\/p>\n
nmap -PU 53 192.168.1.1<\/pre>\nPort Specification<\/strong><\/h5>\nScan a given Port (i.e 21 here)<\/p>\n
nmap -p 21 192.168.1.1<\/pre>\nScan the given Port Range<\/p>\n
nmap -p 21-100 192.168.1.1<\/pre>\nScan the multiple TCP and UDP ports<\/p>\n
nmap -p U:53,T:21-25,80 192.168.1.1<\/pre>\nScan all 65535 ports<\/p>\n
nmap -p- 192.168.1.1<\/pre>\nScans the given Service Name<\/p>\n
nmap -p http,https 192.168.1.1<\/pre>\nScans the Top 100 ports<\/p>\n
nmap -F 192.168.1.1<\/pre>\nService Discovery \/ Version Detection<\/strong><\/h5>\nDetect Version of the Running Services<\/p>\n
nmap -sV 192.168.1.1<\/pre>\nTo set intensity range between 0 to 9. Higher number increases possibility of correctness<\/p>\n
nmap -sV --version-intensity 5 192.168.1.1<\/pre>\nTo enable the light mode(intensity =2). It is faster but have less possibility of correctness<\/p>\n
nmap\u00a0 -sV --version-light 192.168.1.1<\/pre>\nTo enables the intense mode(intensity =9). It is slower but have more possibility of correctness<\/p>\n
nmap -sV --version-all 192.168.1.1<\/pre>\nOperating System Version Detection<\/strong><\/h5>\nDetect the Operating system<\/p>\n
nmap -sV 192.168.1.1<\/pre>\nAggressive mode i.e OS, Service Version, Trace route.<\/p>\n
nmap -A 192.168.1.1<\/pre>\nFirewall \/ IDS Evasion and Spoofing<\/strong><\/h5>\nUse tiny fragmented IP packets. Its harder for packet filters<\/p>\n
nmap -f 192.168.1.1<\/pre>\nUsed to set our own offset size<\/p>\n
nmap --mtu 32 192.168.1.1<\/pre>\nUse the Spoofed IP to scan<\/p>\n
nmap -D decoy-ip1,decoy-ip2, your-own-ip remote-host-ip<\/pre>\nScans target.com from example.com (Domain Name Spoofing)<\/p>\n
nmap -S example.com target.com<\/pre>\nUses the given port as a source<\/p>\n
nmap -g 53 192.168.1.1<\/pre>\nAppends random data to sent packets<\/p>\n
nmap --data-length 200 192.168.1.1<\/pre>\nTime and Performance based Scan<\/strong><\/h5>\nSlow scan<\/p>\n
nmap -T0 192.168.1.1<\/pre>\nSneaky scan<\/p>\n
nmap -T1 192.168.1.1<\/pre>\nTimely scan<\/p>\n
nmap -T2 192.168.1.1<\/pre>\nDefault scan<\/p>\n
nmap -T3 192.168.1.1<\/pre>\nAggressive scan<\/p>\n
nmap -T4 192.168.1.1<\/pre>\nVery Aggressive scan<\/p>\n
nmap -T5 192.168.1.1<\/pre>\nOutput of Scan<\/strong><\/h5>\nTo scan in the Verbose mode (-vv for greater effect)<\/p>\n
nmap -v 192.168.1.1<\/pre>\nSave the scan results to the scan.file<\/p>\n
nmap 192.168.1.1 -oN scan.file<\/pre>\nSave the results in xml.file<\/p>\n
nmap 192.168.1.1 -oX xml.file<\/pre>\nSave the results in grep.file<\/p>\n
nmap 192.168.1.1 -oG grep.file<\/pre>\nSaves the Output in the three major formats at once<\/p>\n
nmap 192.168.1.1 -oA result<\/pre>\nTo scan in the debug mode (-dd for greater effect)<\/p>\n
nmap 192.168.1.1 -d<\/pre>\nTo see all the packets sent and received<\/p>\n
nmap 192.168.1.1 -T4 --packet-trace<\/pre>\nVulnerability \/ Exploit Detection, using Nmap Scripts (NSE)<\/strong><\/h5>\nScan with default NSE Scripts<\/p>\n
nmap 192.168.1.1 -sC<\/pre>\nScan with given NSE Script ( Example: nmap.nse )<\/p>\n
nmap 192.168.1.1 --script=nmap.nse<\/pre>\nUse script with arguments<\/p>\n
nmap 192.168.1.1 \u2013script=nmap.nse --script-args user=admin<\/pre>\n <\/p>\n","protected":false},"excerpt":{"rendered":"
Network Mapper (Nmap) also known as the God of Port Scanners used for network discovery and the basis for most…<\/p>\n","protected":false},"author":1,"featured_media":25485,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,25,13,90],"tags":[105,103,104],"yoast_head":"\n
Nmap Cheat Sheet and Helpful Tips and Techniques<\/title>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\t\n\t\n\t\n\n\n\n\n\n\t\n\t\n\t\n