0% found this document useful (0 votes)
52 views2 pages

Comprehensive Nmap Scanning Guide

The document provides examples of Nmap commands for scanning ports and services on a target IP address. It includes commands for comprehensive scanning of TCP and UDP ports, SSL/TLS scanning, OS detection, and vulnerability scanning.

Uploaded by

subodh yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views2 pages

Comprehensive Nmap Scanning Guide

The document provides examples of Nmap commands for scanning ports and services on a target IP address. It includes commands for comprehensive scanning of TCP and UDP ports, SSL/TLS scanning, OS detection, and vulnerability scanning.

Uploaded by

subodh yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd

sudo nmap -p 1-65535 -T4 -A -v 115.112.148.

68
Intense scan all tcp ports(cross checked Certifacte expiry)

sudo nmap -sS -sU -T4 -A -v [Link]


intense scan all udp ports

nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 --script
"default or (discovery and safe)" [Link]
comperhensive scan

sudo nmap -sV -p 443 -T5 -v --script [Link] [Link]


cipher scan( ssl scan)

sudo nmap -sW [Link] -p 443 --script [Link]


(if cipher scan command didnt work we can run this command)

sudo nmap -sX -v [Link]

nmap -sT -Pn -n --open [Link]


(basic port scanning)

sudo nmap -Pn --script ssl-enum-ciphers [Link]


(TLS version)

nmap -sT -Pn -n --open <IP>

nmap -sT -Pn -n --open <IP> -sV -p53,88,135,139,389,445,464,593,636,3268,3269,3389

nmap -sUV -F <IP or URL>


nmap -sU -T4 <IP or URL>
nmap -sUV -T4 -F --version-intensity 0 <IP or URL>

UDP related scan( Ports,[Link] udp open it wil show


nmap -p 123 -sU [Link]

UDP realted
nmap -sU -pU:123 -Pn -n --max-retries=0 [Link]

UPD related
nmap -sU -T4 [Link]

sudo nmap -sV -Pn --script http-csrf [Link]

nmap -sV --script vulscan --script-args vulscandb=[Link] <target> -p 80,233

sudo nmap -sV --script vulscan [Link]

nmap --script nmap-vulners/ -sV <IP>

sudo nmap -A [Link]


common scan

Port Scanning
nmap -sS [Link]

Host Scanning
nmap -sp [Link]

OS Scanning
nmap -O [Link]

Scan The Most Popular Ports


nmap --top-ports S [Link]
nmap --top-ports 20 [Link]

Output to a File
-oN [Link]

For Ex: nmap -sp [Link] -oN [Provide Folder


Path]kali/home/Desktop/[Link]

FTP Scanning:
nmap -p 22,25,135 -Pn -v -b [Link]

nmap -p 22,25,135 -Pn -v -b [Link]

nmap -sV -sC -Pn [Link] -vv

-sV
nmap -sV <IPADD>

-A
nmap -A <IPADD>

-sX
sudo nmap -sX <IPADD>

-sM
sudo nmap -sM <IPADD>

-sW
sudo nmap -sW <IPADD>

-sV --spoof
nmap -sv --spoof <[Link]>
Instead of original ip, provide next family ip in the same subnet.

You might also like