Menu

NMAP

Switches

nmap -sL

List scan, lists each host of the network specified, without sending any packets to the target hosts. Nmp does a reverse-DNS resolution on the hosts to learn their names.

                
nmap -sL 192.168.100.0-20
    Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-02 09:35 EDT
    Nmap scan report for 192.168.100.0
    Nmap scan report for 192.168.100.1
    Nmap scan report for raspberrypi (192.168.100.2)
    Nmap scan report for 192.168.100.3
    Nmap scan report for 192.168.100.4
    Nmap scan report for 192.168.100.5
    Nmap scan report for 192.168.100.6
    Nmap scan report for 192.168.100.7
    Nmap scan report for 192.168.100.8
    Nmap scan report for 192.168.100.9
    Nmap scan report for 192.168.100.10
    Nmap scan report for 192.168.100.11
    Nmap scan report for 192.168.100.12
    Nmap scan report for 192.168.100.13
    Nmap scan report for 192.168.100.14
    Nmap scan report for 192.168.100.15
    Nmap scan report for 192.168.100.16
    Nmap scan report for 192.168.100.17
    Nmap scan report for 192.168.100.18
    Nmap scan report for 192.168.100.19
    Nmap scan report for 192.168.100.20
    Nmap done: 21 IP addresses (0 hosts up) scanned in 8.50 seconds
            

nmap -sn

No port scan, performs host discovery but no port scan. This is usually known as a "ping scan".


nmap -sn 192.168.100.0-20
    Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-02 09:37 EDT
    Nmap scan report for 192.168.100.1
    Host is up (0.0031s latency).
    Nmap scan report for raspberrypi (192.168.100.2)
    Host is up (0.0027s latency).
    Nmap scan report for 192.168.100.3
    Host is up (0.0025s latency).
    Nmap scan report for 192.168.100.4
    Host is up (0.0023s latency).
    Nmap scan report for 192.168.100.5
    Host is up (0.0078s latency).
    Nmap scan report for 192.168.100.7
    Host is up (0.0015s latency).
    Nmap scan report for 192.168.100.8
    Host is up (0.0012s latency).
    Nmap scan report for 192.168.100.10
    Host is up (0.00075s latency).
    Nmap scan report for 192.168.100.11
    Host is up (0.0017s latency).
    Nmap scan report for 192.168.100.12
    Host is up (0.0015s latency).
    Nmap scan report for 192.168.100.13
    Host is up (0.0036s latency).
    Nmap scan report for 192.168.100.16
    Host is up (0.0030s latency).
    Nmap scan report for 192.168.100.17
    Host is up (0.0027s latency).
    Nmap scan report for 192.168.100.18
    Host is up (0.0025s latency).
    Nmap scan report for 192.168.100.20
    Host is up (0.0018s latency).
    Nmap done: 21 IP addresses (15 hosts up) scanned in 1.27 seconds>
            

nmap -Pn

No ping, this option skips the discovery stage. Nmap will perform the port scans on all hosts that have been passed to Nmap regardless if the host is up or down.


nmap -Pn 192.168.100.1
    Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-02 09:38 EDT
    Nmap scan report for 192.168.100.1
    Host is up (0.0012s latency).
    Not shown: 998 filtered ports
    PORT    STATE SERVICE
    80/tcp  open  http
    443/tcp open  https

    Nmap done: 1 IP address (1 host up) scanned in 8.03 seconds
            

nmap -sS

TCP SYN scan. SYN scan is the default and most popular scan option for good reasons. It can be performed quickly, scanning thousands of ports per second on a fast network not hampered by restrictive firewalls. It is also relatively unobtrusive and stealthy since it never completes TCP connections. SYN scan works against any compliant TCP stack rather than depending on idiosyncrasies of specific platforms as Nmap's FIN/NULL/Xmas, Maimon and idle scans do. It also allows clear, reliable differentiation between the open, closed, and filtered states.

This technique is often referred to as half-open scanning, because you don't open a full TCP connection. You send a SYN packet, as if you are going to open a real connection and then wait for a response. A SYN/ACK indicates the port is listening (open), while a RST (reset) is indicative of a non-listener. If no response is received after several retransmissions, the port is marked as filtered. The port is also marked filtered if an ICMP unreachable error (type 3, code 0, 1, 2, 3, 9, 10, or 13) is received. The port is also considered open if a SYN packet (without the ACK flag) is received in response. This can be due to an extremely rare TCP feature known as a simultaneous open or split handshake connection


nmap -sS 192.168.100.1
    Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-02 09:39 EDT
    Nmap scan report for 192.168.100.1
    Host is up (0.00074s latency).
    Not shown: 998 filtered ports
    PORT    STATE SERVICE
    80/tcp  open  http
    443/tcp open  https
    MAC Address: 6E:10:17:D1:4C:A7 (Unknown)

    Nmap done: 1 IP address (1 host up) scanned in 5.18 seconds
            

nmap -sT

TCP Connect scan. TCP connect scan is the default TCP scan type when SYN scan is not an option. This is the case when a user does not have raw packet privileges. Instead of writing raw packets as most other scan types do, Nmap asks the underlying operating system to establish a connection with the target machine and port by issuing the connect system call. This is the same high-level system call that web browsers, P2P clients, and most other network-enabled applications use to establish a connection. It is part of a programming interface known as the Berkeley Sockets API. Rather than read raw packet responses off the wire, Nmap uses this API to obtain status information on each connection attempt.

When SYN scan is available, it is usually a better choice. Nmap has less control over the high level connect call than with raw packets, making it less efficient. The system call completes connections to open target ports rather than performing the half-open reset that SYN scan does. Not only does this take longer and require more packets to obtain the same information, but target machines are more likely to log the connection. A decent IDS will catch either, but most machines have no such alarm system. Many services on your average Unix system will add a note to syslog, and sometimes a cryptic error message, when Nmap connects and then closes the connection without sending data. Truly pathetic services crash when this happens, though that is uncommon. An administrator who sees a bunch of connection attempts in her logs from a single system should know that she has been connect scanned.


nmap -sT 192.168.100.1
    Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-02 09:40 EDT
    Nmap scan report for 192.168.100.1
    Host is up (0.00086s latency).
    Not shown: 998 filtered ports
    PORT    STATE SERVICE
    80/tcp  open  http
    443/tcp open  https
    MAC Address: 6E:10:17:D1:4C:A7 (Unknown)

    Nmap done: 1 IP address (1 host up) scanned in 4.86 seconds
            

nmap -p

Specifies which ports to scan


nmap -p 80,443 192.168.100.1
    Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-02 09:41 EDT
    Nmap scan report for 192.168.100.1
    Host is up (0.00064s latency).

    PORT    STATE SERVICE
    80/tcp  open  http
    443/tcp open  https
    MAC Address: 6E:10:17:D1:4C:A7 (Unknown)

    Nmap done: 1 IP address (1 host up) scanned in 0.29 seconds
            

nmap -O

OS detection using TCP/IP stack fingerprinting. Nmap sends a series of TCP and UDP packets to the remote host and examines practically every bit in the responses. After performing dozens of tests such as TCP ISN sampling, TCP options support and ordering, IP ID sampling, and the initial window size check, Nmap compares the results to its nmap-os-db database of more than 2,600 known OS fingerprints and prints out the OS details if there is a match. Each fingerprint includes a freeform textual description of the OS, and a classification which provides the vendor name (e.g. Sun), underlying OS (e.g. Solaris), OS generation (e.g. 10), and device type (general purpose, router, switch, game console, etc). Most fingerprints also have a Common Platform Enumeration (CPE) representation, like cpe:/o:linux:linux_kernel:2.6.


nmap -O 192.168.100.2
    Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-02 09:42 EDT
    Nmap scan report for raspberrypi (192.168.100.2)
    Host is up (0.00066s latency).
    Not shown: 996 closed ports
    PORT     STATE SERVICE
    22/tcp   open  ssh
    53/tcp   open  domain
    80/tcp   open  http
    5900/tcp open  vnc
    MAC Address: B8:27:EB:7C:E1:2F (Raspberry Pi Foundation)
    No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
    TCP/IP fingerprint:
    OS:SCAN(V=7.80%E=4%D=9/2%OT=22%CT=1%CU=36249%PV=Y%DS=1%DC=D%G=Y%M=B827EB%TM
    OS:=5F4FA166%P=x86_64-pc-linux-gnu)SEQ(SP=106%GCD=1%ISR=108%TI=Z%CI=Z%II=I%
    OS:TS=A)OPS(O1=M5B4ST11NW7%O2=M5B4ST11NW7%O3=M5B4NNT11NW7%O4=M5B4ST11NW7%O5
    OS:=M5B4ST11NW7%O6=M5B4ST11)WIN(W1=FE88%W2=FE88%W3=FE88%W4=FE88%W5=FE88%W6=
    OS:FE88)ECN(R=Y%DF=Y%T=40%W=FAF0%O=M5B4NNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%
    OS:A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0
    OS:%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S
    OS:=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R
    OS:=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N
    OS:%T=40%CD=S)

    Network Distance: 1 hop

    OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
    Nmap done: 1 IP address (1 host up) scanned in 13.16 seconds
            

nmap -T

Sets timing of the scan. The main effects of T0 are serializing the scan so only one port is scanned at a time, and waiting five minutes between sending each probe. T1 and T2 are similar but they only wait 15 seconds and 0.4 seconds, respectively, between probes. T3 is Nmap's default behavior, which includes parallelization. T4< does the equivalent of --max-rtt-timeout 1250ms --min-rtt-timeout 100ms --initial-rtt-timeout 500ms --max-retries 6 and sets the maximum TCP scan delay to 10 milliseconds. T5 does the equivalent of --max-rtt-timeout 300ms --min-rtt-timeout 50ms --initial-rtt-timeout 250ms --max-retries 2 --host-timeout 15m --script-timeout 10m as well as setting the maximum TCP scan delay to 5 ms.


-T0 Paranoid
-T1 Sneaky
-T2 Polite
-T3 Normal
-T4 Aggressive
-T5 Insane
            

nmap -oN

Requests that normal output be directed to the given filename (txt).

nmap -oX

Requests that XML output be directed to the given filename. Nmap includes a document type definition (DTD) which allows XML parsers to validate Nmap XML output. While it is primarily intended for programmatic use, it can also help humans interpret Nmap XML output. The DTD defines the legal elements of the format, and often enumerates the attributes and values they can take on.

nmap -oG

This output format is covered last because it is deprecated. The XML output format is far more powerful, and is nearly as convenient for experienced users. XML is a standard for which dozens of excellent parsers are available, while grepable output is my own simple hack. XML is extensible to support new Nmap features as they are released, while I often must omit those features from grepable output for lack of a place to put them.

nmap -oA

As a convenience, you may specify -oA <basename> to store scan results in normal, XML, and grepable formats at once. They are stored in <basename>.namp, <basename>.xml, and <basename>.gnmap, respectively. As with most programs, you can prefix the filenames with a directory path, such as ~/nmaplogs/corp/ on Unix or c:\hacking\sco on Windows.