--- obj: application website: https://nmap.org repo: https://github.com/nmap/nmap --- # nmap Network exploration tool and security / port scanner ## Usage Usage: `nmap [Scan Type(s)] [Options] {target specification}` ### Options #### TARGET SPECIFICATION Can pass hostnames, IP addresses, networks, etc. Ex: scanme.nmap.org, 192.168.0.1; 10.0.0-255.1-254 | Option | Description | | --------------------------------------- | --------------------------------- | | `-iL ` | Input from list of hosts/networks | | `--exclude ` | Exclude hosts/networks | | `--excludefile ` | Exclude list from file | #### HOST DISCOVERY | Option | Description | | ----------------------------------- | --------------------------------------------------------------------------------------------------- | | `-sL` | List Scan - simply list targets to scan | | `-sn` | Ping Scan - disable port scan | | `-PS/PA/PU/PY[portlist]` | [TCP](../../../internet/TCP.md) SYN/ACK, [UDP](../../../internet/UDP.md) or SCTP discovery to given ports | | `-PE/PP/PM` | ICMP echo, timestamp, and netmask request discovery probes | | `-n/-R` | Never do [DNS](../../../internet/DNS.md) resolution/Always resolve \[default: sometimes] | | `--dns-servers ` | Specify custom [DNS](../../../internet/DNS.md) servers | | `--traceroute` | Trace hop path to each host | #### SCAN TECHNIQUES | Option | Description | | --------------------- | ------------------------------------------------------------------ | | `-sS/sT/sA/sW/sM` | [TCP](../../../internet/TCP.md) SYN/Connect()/ACK/Window/Maimon scans | | `-sU` | [UDP](../../../internet/UDP.md) Scan | | `-sN/sF/sX` | [TCP](../../../internet/TCP.md) Null, FIN, and Xmas scans | | `--scanflags ` | Customize [TCP](../../../internet/TCP.md) scan flags | | `-sO` | IP protocol scan | #### PORT SPECIFICATION AND SCAN ORDER | Option | Description | | ------------------------------- | --------------------------------------------------------------------------------------------- | | `-p ` | Only scan specified ports. Ex: `-p22`; `-p1-65535`; `-p U:53,111,137,T:21-25,80,139,8080,S:9` | | `--exclude-ports ` | Exclude the specified ports from scanning | | `-F` | Fast mode - Scan fewer ports than the default scan | | `-r` | Scan ports sequentially - don't randomize | | `-top-ports ` | Scan \ most common ports | #### SERVICE/VERSION DETECTION | Option | Description | | ----------------------------- | -------------------------------------------------- | | `-sV` | Probe open ports to determine service/version info | | `--version-intensity ` | Set from 0 (light) to 9 (try all probes) | | `--version-light` | Limit to most likely probes (intensity 2) | | `--version-all` | Try every single probe (intensity 9) | #### SCRIPT SCAN | Option | Description | | ------------------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------- | | `-sC` | equivalent to `--script=default` | | `--script=` | \ is a comma separated list of directories, script-files or script-categories. The scripts are commonly found at `/usr/share/nmap/scripts` | | `--script-updatedb` | Update the script database. | #### OS DETECTION | Option | Description | | ---------------- | --------------------------------------- | | `-O` | Enable OS detection | | `--osscan-limit` | Limit OS detection to promising targets | | `--osscan-guess` | Guess OS more aggressively | #### TIMING AND PERFORMANCE Options which take \