1. Basic Scanning:
To perform a basic scan on a specific target: nmap [target_IP_address]
This will identify open ports on the target.
2. Scan a Specific Port Range:
To scan a specific range of ports: nmap -p [start_port]-[end_port] [target_IP_address]
For example, scan ports 80 to 100: nmap -p 80-100 [target_IP_address]
3. Retrieve Service and Version Information:
To retrieve service and version information: nmap -sV [target_IP_address]
4. Fast Scanning:
For quick results: nmap -F [target_IP_address]
This is a fast option that scans the 100 most common ports.
5. OS Detection:
To determine the target's operating system: nmap -O [target_IP_address]
6. Aggressive Scanning and Scripting:
For more aggressive scanning and scripting: nmap -A [target_IP_address]
7. ICMP Ping Sweep:
To check if the target responds using ICMP ping: nmap -sn [target_IP_address]
8. Generate XML Output:
To save scan results in XML format: nmap -oX [file_name.xml] [target_IP_address]
9. Silent Mode:
To show only open ports and obtain results quietly: nmap -sS [target_IP_address]
10. Save Scan Results:
- To save scan results to a text file:
nmap -oN [file_name.txt] [target_IP_address]
These commands will help you get started with Nmap at a basic level. While Nmap has more features and options, this cheat sheet provides a solid foundation. Remember to perform network scanning operations legally and with proper authorization.
