Sunday, January 25, 2009

nmap

to probe a single target, specify the host name or address

nmap -v target.example.com
nmap -v 10.12.104.200
nmap -v 122.166.23.91,20-25

by default , nmap uses both TCP and ICMP pings for host discovery. if these are blocked by an intervening firewall, the nmap -P options provide alternate ping strategies. if you know that your targets are up , you can disable host discovery with the -P0 option.


run nmap as root if possible. some of its more advanced tests intentionally violate IP protocols., and require raw sockets that only the super user is allowed to access.

use -F option to quickly scan only the well known ports, or the -p option to select different, specific, numeric range of ports. if you want to exhaustively scan all ports, use -p 0 - 65535
disable port scanning entirely with nmap -sP option.

nmap -O enables the operating system fingerprinting.

No comments:

Post a Comment