<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://aznot.com/index.php?action=history&amp;feed=atom&amp;title=Nmap</id>
	<title>Nmap - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://aznot.com/index.php?action=history&amp;feed=atom&amp;title=Nmap"/>
	<link rel="alternate" type="text/html" href="https://aznot.com/index.php?title=Nmap&amp;action=history"/>
	<updated>2026-05-07T04:45:32Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.41.0</generator>
	<entry>
		<id>https://aznot.com/index.php?title=Nmap&amp;diff=5047&amp;oldid=prev</id>
		<title>Kenneth at 22:25, 29 January 2019</title>
		<link rel="alternate" type="text/html" href="https://aznot.com/index.php?title=Nmap&amp;diff=5047&amp;oldid=prev"/>
		<updated>2019-01-29T22:25:14Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;[http://insecure.org/nmap/ nmap]&lt;br /&gt;
&lt;br /&gt;
 # Syn Scan (defaults to SYN Scan if root, Connect Scan if not. See below)&lt;br /&gt;
 nmap &amp;lt;ip&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 # SYN Scan (default scan type if logged in as root)&lt;br /&gt;
 nmap -sS &amp;lt;ip&amp;gt;&lt;br /&gt;
 # &amp;quot;SYN -&amp;gt;&amp;quot;  &amp;quot;SYN/ACK &amp;lt;-&amp;quot;  &amp;quot;RST -&amp;gt;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 # No port scan (ping only) a list of IPs&lt;br /&gt;
 nmap -iL list.txt -sn&lt;br /&gt;
 &lt;br /&gt;
 # TCP Connect Scan (only scan you can do without root privileges)&lt;br /&gt;
 nmap -sT &amp;lt;ip&amp;gt;&lt;br /&gt;
 # &amp;quot;SYN -&amp;gt;&amp;quot;  &amp;quot;SYN/ACK &amp;lt;-&amp;quot;  &amp;quot;ACK -&amp;gt;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 # List Scan does a reverse DNS lookup on a range to find hosts&lt;br /&gt;
 nmap -sL 66.35.250.150-160&lt;br /&gt;
&lt;br /&gt;
 # Ping Scan does a quick ping to each box, and nothing more&lt;br /&gt;
 nmap -sP 10.0.0.0-255&lt;br /&gt;
&lt;br /&gt;
 # Nmap 3.75 help example:&lt;br /&gt;
 namp -v -sS -) www.my.com 192.168.0.0/16 &amp;#039;192.88-90.*.*&amp;#039;&lt;br /&gt;
&lt;br /&gt;
 # Nmap 4.11 help examples:&lt;br /&gt;
 nmap -v -A scanme.nmap.org&lt;br /&gt;
 nmap -v -sP 192.168.0.0/16 10.0.0.0/8&lt;br /&gt;
 nmap -v -iR 10000 -P0 -p 80&lt;br /&gt;
&lt;br /&gt;
Nmap files can be found here (such as nmap-services):&lt;br /&gt;
 /usr/share/nmap/&lt;br /&gt;
&lt;br /&gt;
You can use --datadir flag to point Nmap to alternate support files.&lt;br /&gt;
&lt;br /&gt;
==Target Specification==&lt;br /&gt;
All of these formats will scan the same class B network:&lt;br /&gt;
&lt;br /&gt;
 Wildcards: 192.168.*.*&lt;br /&gt;
 Range: 192.168.0-255.0-255&lt;br /&gt;
 Mask Notation: 192.168.0.0/16&lt;br /&gt;
&lt;br /&gt;
==Common Options==&lt;br /&gt;
 -sS TCP SYN Scan&lt;br /&gt;
 -sT TCP connect() scan&lt;br /&gt;
 -sU UDP port scans (not very reliable)&lt;br /&gt;
 -v Verbose output&lt;br /&gt;
 -vv Very verbose output&lt;br /&gt;
 -O Detect Operating system (TCP/IP fingerprinting)&lt;br /&gt;
 -sV Service version detection&lt;br /&gt;
 -P0 Don&amp;#039;t ping, just scan&lt;br /&gt;
 -A Agressive: same thing as -O -sV&lt;br /&gt;
 -T Scan timing&lt;br /&gt;
 -p Choose ports to be scanned&lt;br /&gt;
 -F Fast Scan: only scan ports in nmap-services file&lt;br /&gt;
 -n Don&amp;#039;t do reverse DNS lookup (increase scan speed)&lt;br /&gt;
&lt;br /&gt;
==nmap References==&lt;br /&gt;
&lt;br /&gt;
Auditor CD?&lt;br /&gt;
&lt;br /&gt;
*[http://www.nmap-tutorial.com/ Nmap-Tutorial.com]&lt;br /&gt;
*[http://www.irongeek.com/i.php?page=videos/nmap1 IronGeek: Basic Nmap Usage (video slide show)]&lt;br /&gt;
*[http://www.irongeek.com/i.php?page=videos/nmap2 IronGeek: Nmap Video Tutorial 2: Port Scan Boogaloo (video slide show)]&lt;br /&gt;
*[http://insecure.org/nmap/man/ nmap Reference guide]&lt;br /&gt;
&lt;br /&gt;
*[http://members.dodo.net.au/~ps2man/Nmap/nmap.html A-SEC Lesson 2 Nmap and other Network Scanning Techniques]&lt;br /&gt;
*[http://neworder.box.sk/newsread.php?newsid=1583 Yet Another Nmap Tutorial]&lt;br /&gt;
*[http://www.irongeek.com/i.php?page=security/ipinfo What can you find out from an IP?]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* nmap-tutorial - http://nmap.org/bennieston-tutorial/&lt;br /&gt;
* Port Scanning Techniques - http://nmap.org/book/man-port-scanning-techniques.html&lt;br /&gt;
* Nmap: The Art of Port Scanning - http://nmap.org/nmap_doc.html&lt;br /&gt;
* Timing and Performance - http://nmap.org/book/man-performance.html&lt;br /&gt;
* http://www.derkeiler.com/Mailing-Lists/securityfocus/security-basics/2007-04/msg00386.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Top 30 Nmap Command Examples For Sys/Network Admins - http://www.cyberciti.biz/networking/nmap-command-examples-tutorials/&lt;/div&gt;</summary>
		<author><name>Kenneth</name></author>
	</entry>
</feed>