Nmap
NETWORK MAPPER (NMAP)
FLAGS/SWITCHES
-sV = Version Detection
-A = Aggressive scan (-sV -O -sC)
SCAN TECHNIQUES
-sX = Xmas scan (Works only against Linux based machines)
-b = FTP Bounce scan
TIPS AND TRICKS:
ACK scan can be a better option to scan a host machine
Stealth scan (SYN) can blend better for scanning SERVERS
By default, Nmap scans the top 1000 commonly used ports.
Fast scans (-F) may scan fewer ports, but generates less traffic.
MORE FLAGS/SWITCHES
TIP: 0 and 1 can avoid IDS. 2 uses less target machine resources.
The slower the speed, the more accurate the scan becomes.
FIREWALL EVASION/SPOOFING
NMAP SCRIPTING ENGINE (NSE)
PORT SPECIFICATION
HOST DISCOVERY
NMAP Scan phases
1) Script pre-scanning
2) Target enumeration (Passing IPs is faster than FQDN)
NMAP PORT STATES
1) Open
2) Closed
3) Filtered
4) Unfiltered
5) Open|Filtered
6) Closed|Filtered
Open = A port accepts a TCP connection/UDP packet
Closed = The device with a closed port doesn't listen for connections
Filtered = Nmap can't determine if it is open or not due to packet filtering preventing probes from reaching it. (Firewall rules, router rules, etc)
Unfiltered = Nmap can't determine if it is open or not, but it is sort of accessible nonetheless.
Scanning Options
Output Options
Performance Options
Last updated