Profile photo of nice brown hairdo young lady look wear coat sweater at the street in autumn

Nmap scanning options


nmap is a powerful network scanning tool that can be used to discover hosts and services on a network, as well as to scan for vulnerabilities and to gain information about a network’s configuration. Here is a list of some common nmap scanning options:

  1. -sS: TCP SYN scan (also known as a stealth scan)
  2. -sT: TCP connect scan
  3. -sU: UDP scan
  4. -sN: TCP Null scan
  5. -sF: TCP FIN scan
  6. -sX: TCP Xmas scan
  7. -sA: TCP ACK scan
  8. -sW: TCP Window scan
  9. -sM: TCP Maimon scan
  10. -sI: TCP idle scan
  11. -sL: List scan (scan for live hosts only)
  12. -sO: IP protocol scan
  13. -sV: Version detection
  14. -A: Enable OS detection, version detection, script scanning, and traceroute
  15. -Pn: Treat all hosts as online (skip host discovery)
  16. -p: Specify ports to scan
  17. -iL: Specify a file containing a list of targets
  18. --exclude: Exclude a host or range of hosts from the scan
  19. --excludefile: Exclude a list of hosts from the scan

This is just a small selection of the options available in nmap. For a complete list of options, you can consult the nmap documentation or use the --help flag when running nmap from the command line.

Previous Story

To download a file from a URL and execute it using Excel VBA

Next Story

How does Ransomware work?