Nmap Scanning
Overview
Core Syntax
nmap [scan_type] [options] <target>Learning Workflow
Target Specification
Single Targets
# Single IP
nmap 192.168.1.1
# Hostname
nmap target.example.com
# Multiple IPs
nmap 192.168.1.1 192.168.1.5 192.168.1.10IP Ranges
From Files
Random Targets
Phase 1: Host Discovery
Discovery Techniques
Option
Technique
Description
Host Discovery Commands
List Scan (No Packets Sent)
Phase 1: Port Scanning
Scan Types
Option
Name
Description
Basic Port Scans
Port Specification
Port States
State
Meaning
Phase 2: Service & Version Detection
Version Detection
OS Detection
Aggressive Scan
Combined Enumeration
Phase 3: Nmap Scripting Engine (NSE)
Script Categories
Category
Description
Running Scripts
Script Arguments
Common Reconnaissance Scripts
Vulnerability Detection Scripts
Brute Force Scripts
Script Information
Phase 4: Evasion & Stealth
Timing Templates
Option
Name
Description
Firewall/IDS Evasion
Idle/Zombie Scan
Timing Controls
Phase 5: Output & Automation
Output Formats
Output Options
Performance Tuning
IPv6 Scanning
Common Scan Profiles
Quick Network Discovery
Standard Vulnerability Assessment
Stealth Scan
Web Server Enumeration
SMB/Windows Enumeration
Database Enumeration
Investigation Workflows
External Reconnaissance
Internal Network Assessment
Incident Response - Lateral Movement Detection
Incident Response - Service Identification
Firewall Rule Mapping
Service-Specific Scans
SSH
FTP
SMTP
DNS
LDAP
SNMP
RDP
VNC
MySQL
MSSQL
Oracle
Parsing Nmap Output
Grep Commands
XML Processing
Tools for Output Parsing
Quick Reference Card
Task
Command
Common Issues & Fixes
Issue
Solution
Legal & Ethical Reminders
Last updated