Skip to content

Latest commit

 

History

History
43 lines (28 loc) · 1.09 KB

scan-networks-using-nmap.md

File metadata and controls

43 lines (28 loc) · 1.09 KB

Scan Networks Using Nmap

Category: Security

Disclaimer: Do not use Nmap on a network or against a host unless you have explicit permission to do so

Nmap allows network admininstrators and penetration testers to find devices running on their network, discover open ports and services, or detect vulnerabilities.

Scan a single host for well-known ports (can use an FQDN or IP address):

nmap 192.168.1.10

Perform a verbose scan against specific multiple hosts:

nmap 192.168.1.10 192.168.1.44 -vv

Scan devices on a subnet:

nmap 192.168.1.1/24

Perform a stealth scan against a target host (this will be slower because the scan does not complete a 3-way handshake):

nmap 192.168.1.1 -sS

Fingerprint target hosts (using a hyphen to specify a range), showing OS version and a list of services and versions where detectable:

nmap 192.168.1.1-60 -sV

Perform an aggressive scan against a target host, showing OS version, a list of services and versions where detectable, and traceroute information:

nmap 192.168.1.1 -A