click below
click below
Normal Size Small Size show me how
Nmap Scan Types
Nmap Scan Types & Nmap Switches
| Question | Answer |
|---|---|
| Full Scan(SYN) Response = RST | Closed Port |
| Full Scan(SYN) Response = SYN/ACK | Open Port |
| Stealth Scan(SYN) Response = RST | Closed Port |
| Stealth Scan(SYN) Response = SYN/ACK | Open Port |
| XMAS Scan(FIN/URG/PSH) Response = No response | Open Port |
| XMAS Scan(FIN/URG/PSH) Response = RST | Closed Port |
| Inverse TCP(FIN,URG OR PSH or no flags set) Response = No Response | Open Port |
| Inverse TCP(FIN,URG OR PSH or no flags set) = RST/ACK | Closed Port |
| ACK scan | -sA |
| FIN scan | -sF |
| IDLE scan | -sI |
| DNS scan or list scan | -sL |
| NULL scan | -sN |
| Protocol scan | -sO |
| Ping scan | -sP |
| RPC scan | -sR |
| SYN scan | -sS |
| TCP connect scan | -sT |
| Windows scan | -sW |
| XMAS scan | -sX |
| ICMP ping | -PI |
| No ping | -Po |
| SYN ping | -PS |
| TCP ping | -PT |
| Normal output | -oN |
| XML output | -oX |
| Serial, slowest scan | -T0 |
| Serial Slowest scan | -T1 |
| Serial normal speed scan | -T2 |
| Parallel normal speed scan | -T3 |
| Parallel fast scan | -T4 |
| Nmap TCP Connect Scan | nmap -sT <IPAddress> |
| Nmap Identify Host Name (List Scan) | nmap -sL <IPAddress/24> |
| Nmap Identify Operating System of a Host | nmap -O <IPAddress> |
| Nmap Scan for open ports | nmap <IPAddress> |
| Nmap Ping Scan | nmap -sP <IPAdress> |
| Nmap Version Detection | nmap -sV <IPAddress> or nmap -A <IPAddress> |
| Nmap SYN Scan | nmap -sS <IPAddress> |
| Nmap UDP Scan | nmap sU <IPAddress> |
| Nmap Fast Scan | nmap -T4 -F <IPAddress> |