nmap

Network exploration tool and security / port scanner

copy
80
12
nmap -v -A scanme.nmap.org

details |

copy
39
2
nmap -v -sP 192.168.0.0/16 10.0.0.0/8

details |

copy
30
3
nmap -A -T4 scanme.nmap.org playgroundScans scanme.nmap.org enabling OS detection and Version detection, Script scanning and Traceroute, also set timing template to 4

details |

copy
10
0
nmap -sS -O scanme.nmap.org/24

source | details |

copy
19
2
nmap -sS -O scanme.nmap.org/24Launches a stealth SYN scan against each machine that is up out of the 255 machines on "class C" network where Scanme resides. It also tries to determine what operating system is running on each host that is up and running. This requires root privileges because of the SYN scan and OS detection.

details |

copy
16
4
nmap -sS -PS80 -iR 0 -p 80

details |

copy
16
3
nmap -v -iR 100000 -PN -p 80Asks Nmap to choose 100,000 hosts at random and scan them for web servers (port 80). Host enumeration is disabled with -PN since first sending a couple probes to determine whether a host is up is wasteful when you are only probing one port on each target host anyway.

details |

copy
14
1
nmap -v scanme.nmap.org

details |

copy
13
1
nmap -PN -p80 -oX logs/pb-port80scan.xml -oG logs/pb-port80scan.gnmap 216.163.128.20/20This scans 4096 IPs for any web servers (without pinging them) and saves the output in grepable and XML formats.

details |

copy
12
1
nmap --script-updatedb.

details |

copy
11
0
nmap -v -sP 192.168.0.0/16 10.0.0.0/8

source | details |

copy
29
11
nmap -sV -p 22,53,110,143,4564 198.116.0-255.1-127Launches host enumeration and a TCP scan at the first half of each of the 255 possible 8 bit subnets in the 198.116 class B address space. This tests whether the systems run SSH, DNS, POP3, or IMAP on their standard ports, or anything on port 4564. For any of these ports found open, version detection is used to determine what application is running.

details |

copy
9
6
nmap -v -iR 10000 -PN -p 80

details |

copy
5
0
nmap -v scanme.nmap.org

source | details |

copy
4
0
nmap -sS -PS80 -iR 0 -p 80

source | details |

copy
4
0
nmap -v -A scanme.nmap.org

source | details |

copy
3
0
nmap --script "default or safe"

source | details |

copy
2
0
nmap -PN -p80 -oX logs/pb-port80scan.xml -oG logs/pb-port80scan.gnmap 216.163.128.20/20

source | details |