Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
7 views

Nmap Cheat Sheet

The document is a comprehensive Nmap cheat sheet that provides various command switches and examples for scanning IP addresses, ports, and services. It covers topics such as target specification, scan techniques, host discovery, service and version detection, OS detection, and output options. Additionally, it includes tips for firewall evasion and using Nmap scripting engine (NSE) scripts for enhanced scanning capabilities.

Uploaded by

faggotkilla
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Nmap Cheat Sheet

The document is a comprehensive Nmap cheat sheet that provides various command switches and examples for scanning IP addresses, ports, and services. It covers topics such as target specification, scan techniques, host discovery, service and version detection, OS detection, and output options. Additionally, it includes tips for firewall evasion and using Nmap scripting engine (NSE) scripts for enhanced scanning capabilities.

Uploaded by

faggotkilla
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Cyber Security Blog

Nmap Cheat Sheet


July 19, 2017 by Nathan House

 Tweet  Share  Share


463  Share
0  Pin5

Target Speci cation


Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Switch Example Description

nmap 192.168.1.1 Scan a single IP

nmap 192.168.1.1 192.168.2.1 Scan speci c IPs

nmap 192.168.1.1-254 Scan a range


nmap scanme.nmap.org Scan a domain

nmap 192.168.1.0/24 Scan using CIDR notation

-iL nmap -iL targets.txt Scan targets from a le

-iR nmap -iR 100 Scan 100 random hosts

--exclude nmap --exclude 192.168.1.1 Exclude listed hosts

Scan Techniques

Switch Example Description

-sS nmap 192.168.1.1 -sS TCP SYN port scan (Default)

-sT nmap 192.168.1.1 -sT TCP connect port scan


(Default without root privilege)
-sU nmap 192.168.1.1 -sU UDP port scan

-sA nmap 192.168.1.1 -sA TCP ACK port scan

-sW nmap 192.168.1.1 -sW TCP Window port scan

-sM nmap 192.168.1.1 -sM TCP Maimon port scan

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Host Discovery

Switch Example Description

-sL nmap 192.168.1.1-3 -sL No Scan. List targets only

-sn nmap 192.168.1.1/24 -sn Disable port scanning. Host


discovery only.

-Pn nmap 192.168.1.1-5 -Pn Disable host discovery. Port scan


only.

-PS nmap 192.168.1.1-5 -PS22- TCP SYN discovery on port x.


25,80 Port 80 by default

-PA nmap 192.168.1.1-5 -PA22- TCP ACK discovery on port x.


25,80 Port 80 by default
-PU nmap 192.168.1.1-5 -PU53 UDP discovery on port x.
Port 40125 by default
-PR nmap 192.168.1.1-1/24 -PR ARP discovery on local network
-n nmap 192.168.1.1 -n Never do DNS resolution

Port Speci cation

Switch Example Description

-p nmap 192.168.1.1 -p 21 Port scan for port x

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Switch Example Description

-p nmap 192.168.1.1 -p 21-100 Port range


-p nmap 192.168.1.1 -p Port scan multiple TCP and UDP
U:53,T:21-25,80 ports
-p- nmap 192.168.1.1 -p- Port scan all ports

-p nmap 192.168.1.1 -p Port scan from service name


http,https

-F nmap 192.168.1.1 -F Fast port scan (100 ports)


nmap 192.168.1.1 --top-ports Port scan the top x ports
--top-ports 2000
nmap 192.168.1.1 -p-65535 Leaving o initial port in range
-p-65535 makes the scan start at port 1
-p0- nmap 192.168.1.1 -p0- Leaving o end port in range
makes the scan go through to
port 65535

Service and Version Detection

Switch Example Description

Attempts to determine the


-sV nmap 192.168.1.1 -sV version of the service running on
port

nmap 192.168.1.1 -sV -- Intensity level 0 to 9. Higher


-sV --version-intensity version-intensity 8 number increases possibility of
correctness

-sV --version-light nmap 192.168.1.1 -sV -- Enable light mode. Lower


version-light possibility of correctness. Faster

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Switch Example Description

-sV --version-all nmap 192.168.1.1 -sV -- Enable intensity level 9. Higher


version-all possibility of correctness. Slower
-A nmap 192.168.1.1 -A Enables OS detection, version
detection, script scanning, and
traceroute

OS Detection

Switch Example Description

-O nmap 192.168.1.1 -O Remote OS detection using TCP/IP


stack ngerprinting

nmap 192.168.1.1 -O -- If at least one open and one closed


-O --osscan-limit osscan-limit TCP port are not found it will not try
OS detection against host

-O --osscan- nmap 192.168.1.1 -O -- Makes Nmap guess more aggressively


guess osscan-guess

-O --max-os- nmap 192.168.1.1 -O --max- Set the maximum number x of OS


tries os-tries 1 detection tries against a target

-A nmap 192.168.1.1 -A Enables OS detection, version detection, script


scanning, and traceroute

Timing and Performance


Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Switch Example Description

-T0 nmap 192.168.1.1 -T0 Paranoid (0) Intrusion Detection


System evasion
-T1 nmap 192.168.1.1 -T1 Sneaky (1) Intrusion Detection
System
evasion

-T2 nmap 192.168.1.1 -T2 Polite (2) slows down the scan to
use
less bandwidth and use less
target
machine resources

-T3 nmap 192.168.1.1 -T3 Normal (3) which is default speed


-T4 nmap 192.168.1.1 -T4 Aggressive (4) speeds scans;
assumes
you are on a reasonably fast and
reliable network

-T5 nmap 192.168.1.1 -T5 Insane (5) speeds scan; assumes


you
are on an extraordinarily fast
network

Switch Example input Description

--host-timeout <time> 1s; 4m; 2h Give up on target after this long

--min-rtt-timeout/max-rtt-timeout/initial- 1s; 4m; 2h Speci es probe round trip time


rtt-timeout <time>

--min-hostgroup/max- 50; 1024 Parallel host scan group


hostgroup <size<size> sizes

--min-parallelism/max- 10; 1 Probe parallelization


parallelism <numprobes>

--scan-delay/--max-scan-delay <time> 20ms; 2s; 4m; 5h Adjust delay between probes

--max-retries <tries> 3 Specify the maximum number


of port scan probe retransmissions

--min-rate <number> 100 Send packets no slower


than <numberr> per second

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Switch Example input Description

--max-rate <number> 100 Send packets no faster than <number>


per second

NSE Scripts

Switch Example Description

-sC nmap 192.168.1.1 -sC Scan with default NSE


scripts. Considered
useful for discovery
and safe

--script default nmap 192.168.1.1 --script default Scan with default NSE
scripts. Considered
useful for discovery and
safe

--script nmap 192.168.1.1 --script=banner Scan with a single


script. Example banner

--script nmap 192.168.1.1 --script=http* Scan with a wildcard.


Example http

--script nmap 192.168.1.1 --script=http,banner Scan with two scripts.


Example http and
banner

--script nmap 192.168.1.1 --script "not intrusive" Scan default, but


remove intrusive scripts
--script-args nmap --script snmp-sysdescr --script-args NSE script with
snmpcommunity=admin 192.168.1.1 arguments

Useful NSE Script Examples

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Command Description

nmap -Pn --script=http-sitemap-generator http site map generator


scanme.nmap.org

nmap -n -Pn -p 80 --open -sV -vvv --script Fast search for random web servers
banner,http-title -iR 1000

nmap -Pn --script=dns-brute domain.com Brute forces DNS hostnames guessing


subdomains

nmap -n -Pn -vv -O -sV --script smb-enum*,smb- Safe SMB scripts to run
ls,smb-mbenum,smb-os-discovery,smb-s*,smb-
vuln*,smbv2* -vv 192.168.1.1
nmap --script whois* domain.com Whois query

nmap -p80 --script http-unsafe-output-escaping Detect cross site scripting vulnerabilities


scanme.nmap.org

nmap -p80 --script http-sql-injection Check for SQL injections


scanme.nmap.org

Firewall / IDS Evasion and Spoo ng

Switch Example Description

-f nmap 192.168.1.1 -f Requested scan (including ping scans)


use tiny fragmented IP packets. Harder
for packet lters

--mtu nmap 192.168.1.1 --mtu 32 Set your own o set size

-D nmap -D 192.168.1.101,192.168.1.102, Send scans from spoofed IPs


192.168.1.103,192.168.1.23 192.168.1.1

-D nmap -D decoy-ip1,decoy-ip2,your-own- Above example explained


ip,decoy-ip3,decoy-ip4 remote-host-ip

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Switch Example Description

-S nmap -S www.microsoft.com Scan Facebook from Microsoft (-e eth0 -


www.facebook.com Pn may be required)
-g nmap -g 53 192.168.1.1 Use given source port number
--proxies nmap --proxies http://192.168.1.1:8080, Relay connections through HTTP/SOCKS4
http://192.168.1.2:8080 192.168.1.1 proxies
--data-length nmap --data-length 200 192.168.1.1 Appends random data to sent packets

Example IDS Evasion command


nmap -f -t 0 -n -Pn –data-length 200 -D 192.168.1.101,192.168.1.102,192.168.1.103,192.168.1.23
192.168.1.1

Output

Switch Example Description

-oN nmap 192.168.1.1 -oN normal. le Normal output to the


le normal. le
-oX nmap 192.168.1.1 -oX xml. le XML output to the le
xml. le

-oG nmap 192.168.1.1 -oG grep. le Grepable output to the


le grep. le
-oA nmap 192.168.1.1 -oA results Output in the three
major formats at once

-oG - nmap 192.168.1.1 -oG - Grepable output to


screen. -oN -, -oX - also
usable

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Switch Example Description

--append-output nmap 192.168.1.1 -oN le. le --append-output Append a scan to a


previous scan le
-v nmap 192.168.1.1 -v Increase the verbosity
level (use -vv or more
for greater e ect)
-d nmap 192.168.1.1 -d Increase debugging
level (use -dd or more
for greater e ect)

--reason nmap 192.168.1.1 --reason Display the reason a


port is in a particular
state, same output as -
vv
--open nmap 192.168.1.1 --open Only show open (or
possibly open) ports
--packet-trace nmap 192.168.1.1 -T4 --packet-trace Show all packets sent
and received
--i ist nmap --i ist Shows the host
interfaces and routes
--resume nmap --resume results. le Resume a scan

Helpful Nmap Output examples

Command Description
nmap -p80 -sV -oG - --open 192.168.1.1/24 | grep open Scan for web servers and grep to show
which IPs are running web servers
nmap -iR 10 -n -oX out.xml | grep "Nmap" | cut -d " " - Generate a list of the IPs of live hosts
f5 > live-hosts.txt
nmap -iR 10 -n -oX out2.xml | grep "Nmap" | cut -d " " - Append IP to the list of live hosts
f5 >> live-hosts.txt
ndi scanl.xml scan2.xml Compare output from nmap using the ndif

xsltproc nmap.xml -o nmap.html Convert nmap xml les to html les


grep " open " results.nmap | sed -r 's/ +/ /g' | sort | Reverse sorted list of how often ports turn
uniq -c | sort -rn | less up

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Miscellaneous Options

Switch Example Description

-6 nmap -6 2607:f0d0:1002:51::4 Enable IPv6 scanning


-h nmap -h nmap help screen

Other Useful Nmap Commands

Command Description

nmap -iR 10 -PS22-25,80,113,1050,35000 -v -sn Discovery only on ports x, no port scan


nmap 192.168.1.1-1/24 -PR -sn -vv Arp discovery only on local network, no port
scan
nmap -iR 10 -sn -traceroute Traceroute to random targets, no port scan

nmap 192.168.1.1-50 -sL --dns-server 192.168.1.1 Query the Internal DNS for hosts, list targets
only

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
The Complete Nmap Ethical Hacking
Course
Enroll in the course and become an expert in the ethical hacking and
network security tool Nmap!

Learn More

About Nathan House

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Nathan House is the founder and CEO of Station X a cyber security training and consultancy
company. He has over 24 years experience in cyber security where he has advised some of
largest companies in the world, assuring security on multi-million and multi-billion pound
projects.

Nathan is the author of the popular "The Complete Cyber Security Course" which has been taken by over
100,000 students in 175 countries.

Over the years he has spoken at a number of security conferences, developed free security tools, and
discovered serious security vulnerabilities in leading applications.

PGP Fingerprint : 0238 3006 75CD F734 029A 703E 3581 1381 D119 CB2E

Comments

Milton says
July 20, 2017 at 9:28 pm

Thanks a lot for the information. it is very useful.

Reply

Jimmy Toriola says

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
July 20, 2017 at 9:51 pm

That will be a helpful tipsheet. Thank you so much. I can learn more about it. looking forward to the hacking
course from you.

Reply

Eddie says
July 21, 2017 at 12:43 am

Looking forward to it. I use nmap most days but only use a limited number of switches.

Reply

Oliver Suzuki says


July 21, 2017 at 2:41 pm

Keep the good hands-on stu coming

Reply

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Fran says
July 21, 2017 at 6:23 pm

Thank you very much in deed, very useful, I will buy your course on nmap, I want to insist about a Firewall course
there aren’t around, I guess it is a good investment for you, I bought already all your courses and they are the
best! Please keep going!

Reply

Celestino J says
July 24, 2017 at 5:52 pm

Great news.
In expectation of this course.
As usual ,
Thanks for what you doing.

Reply

Marious says
October 18, 2017 at 6:00 pm

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
I think this is very Useful,Thank you soo much.Am enjoying the training and practice.

Reply

Arthur says
November 2, 2017 at 5:28 pm

Love it. Thank you Nathan!

Reply

Horacio Castellini says


December 1, 2017 at 11:47 am

Muchas gracias ,,, me fue de utilidad,,,

Reply

krishna says

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
December 11, 2017 at 7:49 am

How to test .net Web services using ZenMap

Reply

Nathan House says


December 11, 2017 at 11:10 am

You will need to expand on this question as I’m not clear what you are asking?

Reply

Abdulrahman Mogram says


December 31, 2017 at 10:05 am

Thank you for sharing this information!

Reply

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
reike says
January 10, 2018 at 2:58 pm

Thank you for this cheatsheet.


I think there is a mistake concerning the -sS switch. It is not the default one.
Normally, -sT is the default one and -sS needs root privileges.

Reply

Nathan House says


January 10, 2018 at 3:26 pm

Default with root. I assume you are running as root!

Reply

sudo says
January 13, 2018 at 4:00 pm

Hi

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
This is very helpful. Thanks a lot!

Reply

Leave a Reply
Your email address will not be published. Required elds are marked *

Comment

Name *

Email *

Save my name, email, and website in this browser for the next time I comment.

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
POST COMMENT

Search this website … SEARCH

The Complete Cyber Security Course

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Over 50 hours of On-Demand Video Lectures

Learn More

Tweets by @GotoNathan

Recent Posts

The Cyber Security Skills Gap is Getting Wider…

Attention PGP Users: Critical PGP and S/MIME bugs

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Cyber Security Career Talk With Nathan House – Secure Talk Podcast

US, UK issue odd warning about Russian hackers

1.1.1.1 A New Privacy and Security Focused DNS Resolver

Categories

Advisories and White Papers

Car Hacking

Company News

Free Security Tools

General

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Security Tools

Videos

The Complete Cyber Security Course

Over 50 hours of On-Demand Video Lectures

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Learn More

INFO SECURITY ASSESSMENT


Legal Notices Penetration Testing
Privacy Policy Vulnerability Scanning
Site Map Build Reviews
Source Code Review
Social Engineering

CONSULTING
Audit & Compliance
Incident Response
Security Architecture
Risk Assessment
Security Training

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
COPYRIGHT © 2018 STATION X LTD. ALL RIGHTS RESERVED.

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD

You might also like