Nmap Manual ‐ JM - Jacob-Mayotte/SEC335_Tech_Journal GitHub Wiki
This page consists of nmap commands that were introduced through the class's labs:
Flags:
-s: Used to specify the type of scan desired to run-Sn(No port scan): "This option tells Nmap not to do a port scan after host discovery, and only print out the available hosts that responded to the host discovery probes. (Source)"-v: Informs nmap to provide output with relevant information-Vv(Very Verbose): Informs nmap to provide more detailed information about a scan, incl. Version detection & script scanning output-n: Directs nmap to not perform reverse DNS resolutions-p {port}: Used to scan a specific port. This can be extended to target a range of ports too:-p 1-65535-Pn: Skips ping test and scan all target hosts that were provided-sV: Used to enable version detection during a scan-A: Has Nmap do operating system detection, version detection, script tracing, and traceroute-oG: Instructs Nmap to generate output in "grepable" format-sT: Used to specify the type of scan to perform, and it stands for "TCP connect scan."-sU: Used to perform a UDP scan-vC: combination of verbose scan and script scan-c: default script scan