Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Scan Hostname:
- [root@server1 ~]# nmap server2.tecmint.com
- Scan IP:
- [root@server1 ~]# nmap 192.168.0.101
- Scan -V (detail):
- [root@server1 ~]# nmap -v server2.tecmint.com
- Scan Multiple Host:
- [root@server1 ~]# nmap 192.168.0.101 192.168.0.102 192.168.0.103
- Scan subnet:
- [root@server1 ~]# nmap 192.168.0.*
- Scan Multiple Servers using last octet of IP address:
- [root@server1 ~]# nmap 192.168.0.101,102,103
- Scan list of Hosts from a File:
- [root@server1 ~]# cat > nmaptest.txt
- Scan an IP Address Range:
- [root@server1 ~]# nmap 192.168.0.101-110
- Scan Network Excluding Remote Hosts:
- [root@server1 ~]# nmap 192.168.0.* --exclude 192.168.0.100
- Scan OS information and Traceroute:
- [root@server1 ~]# nmap -A 192.168.0.101
- OS Detection:
- [root@server1 ~]# nmap -O server2.tecmint.com
- Scan a Host to Detect Firewall:
- [root@server1 ~]# nmap -sA 192.168.0.101
- Scan a Host to check its protected by Firewall:
- [root@server1 ~]# nmap -PN 192.168.0.101
- Find out Live hosts in a Network:
- [root@server1 ~]# nmap -sP 192.168.0.*
- Scan Ports Consecutively:
- [root@server1 ~]# nmap -r 192.168.0.101
- Print Host interfaces and Routes:
- [root@server1 ~]# nmap --iflist
- Scan for specific Port:
- [root@server1 ~]# nmap -p 80 server2.tecmint.com
- Scan a TCP Port:
- [root@server1 ~]# nmap -p T:8888,80 server2.tecmint.com
- Scan a UDP Port:
- [root@server1 ~]# nmap -sU 53 server2.tecmint.com
- Scan Multiple Ports:
- [root@server1 ~]# nmap -p 80,443 192.168.0.101
- Scan Ports by Network Range:
- [root@server1 ~]# nmap -p 80-160 192.168.0.101
- Scan remote hosts using TCP ACK (PA) and TCP Syn (PS):
- [root@server1 ~]# nmap -PS 192.168.0.101
- Scan Remote host for specific ports with TCP ACK:
- [root@server1 ~]# nmap -PA -p 22,80 192.168.0.101
- Scan Remote host for specific ports with TCP Syn:
- [root@server1 ~]# nmap -PS -p 22,80 192.168.0.101
- Perform a stealthy Scan:
- [root@server1 ~]# nmap -sS 192.168.0.101
- Check most commonly used Ports with TCP Syn:
- [root@server1 ~]# nmap -sT 192.168.0.101
- Perform a tcp null scan to fool a firewall:
- [root@server1 ~]# nmap -sN 192.168.0.101
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement