sudo nmap -p 1-65535 -T4 -A -v 115.112.148.
68
Intense scan all tcp ports(cross checked Certifacte expiry)
sudo nmap -sS -sU -T4 -A -v [Link]
intense scan all udp ports
nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 --script
"default or (discovery and safe)" [Link]
comperhensive scan
sudo nmap -sV -p 443 -T5 -v --script [Link] [Link]
cipher scan( ssl scan)
sudo nmap -sW [Link] -p 443 --script [Link]
(if cipher scan command didnt work we can run this command)
sudo nmap -sX -v [Link]
nmap -sT -Pn -n --open [Link]
(basic port scanning)
sudo nmap -Pn --script ssl-enum-ciphers [Link]
(TLS version)
nmap -sT -Pn -n --open <IP>
nmap -sT -Pn -n --open <IP> -sV -p53,88,135,139,389,445,464,593,636,3268,3269,3389
nmap -sUV -F <IP or URL>
nmap -sU -T4 <IP or URL>
nmap -sUV -T4 -F --version-intensity 0 <IP or URL>
UDP related scan( Ports,[Link] udp open it wil show
nmap -p 123 -sU [Link]
UDP realted
nmap -sU -pU:123 -Pn -n --max-retries=0 [Link]
UPD related
nmap -sU -T4 [Link]
sudo nmap -sV -Pn --script http-csrf [Link]
nmap -sV --script vulscan --script-args vulscandb=[Link] <target> -p 80,233
sudo nmap -sV --script vulscan [Link]
nmap --script nmap-vulners/ -sV <IP>
sudo nmap -A [Link]
common scan
Port Scanning
nmap -sS [Link]
Host Scanning
nmap -sp [Link]
OS Scanning
nmap -O [Link]
Scan The Most Popular Ports
nmap --top-ports S [Link]
nmap --top-ports 20 [Link]
Output to a File
-oN [Link]
For Ex: nmap -sp [Link] -oN [Provide Folder
Path]kali/home/Desktop/[Link]
FTP Scanning:
nmap -p 22,25,135 -Pn -v -b [Link]
nmap -p 22,25,135 -Pn -v -b [Link]
nmap -sV -sC -Pn [Link] -vv
-sV
nmap -sV <IPADD>
-A
nmap -A <IPADD>
-sX
sudo nmap -sX <IPADD>
-sM
sudo nmap -sM <IPADD>
-sW
sudo nmap -sW <IPADD>
-sV --spoof
nmap -sv --spoof <[Link]>
Instead of original ip, provide next family ip in the same subnet.