Nmap Common Commands - singirikondamani/Noted GitHub Wiki
Notes: -T is time template 0 to 5 choosing 0 scan will be slower and 5 is faster but not accurate data but 4 is good balance, choose -sn is no port scan,
- Identify Live machine in given subnet →
nmap -sn -t4 <0.0.0.0/24> (in live if output is 4 in answer enter 3 for default host ip will not count)
- Identify IP address of Machine which has port 21 →
nmap -t4 <0.0.0.0/24>
nmap -sV -sC -p21 <0.0.0.0/24>
- Identify IP address of domain controller →
nmap -p53 -T4 <0.0.0.0/24>
- Identify host discovery services like NETBIOS →
nmap -sV -sC -p 137,138,139 <0.0.0.0/24>
,nmap -T4 -A <0.0.0.0/24>
,nmap -sV -sC -p- <0.0.0.0/24>
- Identify DNS computer name DC →
nmap -T4 -A <0.0.0.0>
- Perform the Intense scan to find DC, FQDN →
nmap -T4 -A <0.0.0.0>
- Identify the services, vulnerable version scan →
nmap -sV -sC <0.0.0.0/24>
,nmap -sV -p <Service Port> <0.0.0.0/24>
,nmap -sV -T4 -A <0.0.0.0/24>
,nmap -sV -p22 <0.0.0.0/24>
- Identify the OS of the traget →
nmap -O -sV -p 3306 <0.0.0.0>
,nmap -O -sV -p 3306 -T4 <0.0.0.0>
- Identify the NFS service enable →
nmap -T4 -p- <0.0..0>
,nmap -T4 -p2049 <0.0.0.0>
,nmap -T4 -A <0.0.0.0/24>
- Identify the SMTP service →
nmap -T4 -p- -sV <0.0.0.0/24>
,nmap -T4 -p 25 <0.0.0.0/24>
,nmap -T4 -sV <0.0.0.0/24>
- Identify the SMB enumeration check weather the message signing feature enable or not →
nmap -sV -T4 -A <0.0.0.0>
- sudo netdiscover -r 192.168.1.0/24 -s 500 Alive Host suing ARP