nmap Cheat Sheet
nmap is used to discover hosts and services on a computer network, thus building a map of the network.
Cheat Sheet
Ping scans the network, listing machines that respond to ping:
Full TCP port scan using with service version detection - usually my first scan, I find T4 more accurate than T5 and still pretty quick:
Prints verbose output, runs stealth syn scan, T4 timing, OS and version detection + traceroute and scripts against target services:
Prints verbose output, runs stealth syn scan, T5 timing, OS and version detection + traceroute and scripts against target services:
Prints verbose output, runs stealth syn scan, T5 timing, OS and version detection:
Prints verbose output, runs stealth syn scan, T4 timing, OS and version detection + full port range scan:
Prints verbose output, runs stealth syn scan, T5 timing, OS and version detection + full port range scan:
Scan from file.
Scans a list of IP addresses, you can add options before / after.
Output Formats
Outputs grepable output to a file, in this example Netbios servers. E.g, The output file could be grepped for Open:
Export output to a HTML report:
Netbios Examples
Find all Netbios servers on a subnet:
Display Netbios name:
Check if Netbios servers are vulnerable to MS08-067 (--script-args=unsafe=1
has the potential to crash servers / services).
Nikto Scan
Scans for http servers on port 80 and pipes into Nikto for scanning:
Scans for http/https servers on port 80, 443 and pipes into Nikto for scanning:
Last updated