Port scanning
Last updated
Last updated
The Network Mapper - Free Security Scanner
Standalone
XSL Bootstrap
-p
Port ranges (default: most common 1000 ports), -p- all ports (1-65536)
-sV
Version scanning, enforces full TCP connection
-sC
Script scanning
-O
OS detection
-A
Aggressive scan options, combines: -O, -sV, -sC, --traceroute
-T<0-5>
Set timing template (higher is faster), aka paranoid|sneaky|polite|normal|aggressive|insane (default: 3, aka normal)
-oA
Basename (Output to all formats)
-sU
UDP scan
-Pn
Skip host discovery, use this option if the host is blocking ping probes.
-v
-vv
Increase verbosity
-d
-dd
Debug, even more verbose
--max-retries
set to 1 or 0 to considerably speed up scan (but gets a bit less accurate)
Note: There are a ton of other options, like more exotic scan types, spoofing IP or MAC addresses, etc.
Note: Nmap can only perform TCP SYN scans (-sS
), when running as privileged user (root or sudoer), otherwise it falls back to full TCP 3-way handshakes (-sT
) per default.
Light scan
Default scan
Heavy scan
Scan for "safe" vulns
Scan for SMB vulns
Get open ports comma separated
Quicker scanning and smarter identification
NSE script based on Vulners.com API
A script that you can run in the background!
TCP/IP swiss army knife
Connect scan (only validates if ports are open)
No response means port is open, otherwise a ICMP packet port unreachable
is sent back.
BUT: Response may get dropped (firewalls, routers, ...) -> false positive
In computer networking, port knocking is a method of externally opening ports on a firewall by generating a connection attempt on a set of prespecified closed ports.
Actually knock to a port
or
--