wwww retweetledi
wwww
845 posts

wwww retweetledi

Nmap Commands for Educational Use only.
Nmap is a network scanning tool used by system administrators, IT professionals, and students for security auditing, troubleshooting, and learning.
Common Scans
nmap -sP → Ping Scan: Checks which devices are active on a network.
nmap -sS → TCP SYN Scan: Helps discover open services.
nmap -sU → UDP Scan: Finds active UDP services.
nmap -sV → Version Detection: Identifies service versions for maintenance.
nmap -O → OS Detection: Detects operating system type (for compatibility testing).
nmap -A → Aggressive Scan: Runs multiple checks for detailed results.
Timing & Input
nmap -T4 → Timing Template: Controls scan speed.
nmap -iL → Input from List: Reads targets from a file (useful for admins).
nmap -sn → Host Discovery: Finds devices without scanning ports.
Advanced TCP Techniques
nmap -sX → XMAS Scan: Uses a special test packet to check responses.
nmap -sF → FIN Scan: Uses a different method for host analysis.
nmap -sT → TCP Connect Scan: Connects directly to services.
nmap -sN → Null Scan: Uses empty packets to analyze responses.
nmap -sA → ACK Scan: Helps detect firewall filtering.
Scripting & Port Options
nmap -sC → Default Script Scan: Runs safe built-in scripts.
nmap --script

