English Nmap Guide

Dolyetyus

Co Admin
21 Nis 2020
1,205
666
Delft
Nmap is a security scanner developed by computer networks specialist Gordon Lyon (Fyodor). It can map the scanned network and observe the status of services running on network machines, operating systems, and port status.
By using Nmap, information such as the operating system of any computer connected to the network, the types of physical devices running, the working time, which services the software uses, the version numbers of the software, whether the computer has a firewall, and the name of the manufacturer of the network card can be learned.
Nmap is completely free GPL licensed software and source code can be downloaded from the relevant section of the site if desired. Operating systems where Nmap can be used can be listed as Linux, Windows, MacOS, Solaris, * BSD and AmigaOS, but it is more popular in Linux and then Windows.



Note: There may be some differences due to the version used, Firewall / IDSs, introduction of command parameters.


Target Spesification

-iL: Performs host or network list scan from files



dWfOK6.png



-iR: Random targets are selected


yJN9aa.png



--exclude Excludes specified hosts or networks


9b2KPb.png



--excludefile Does not include the lists specified in the files


CPMeQC.png



Host Discovery


-sL: Simply (without going into details) scans possible targets



O9c1Ix.png



-sN: Does not perform port scanning (disables it)


x99WT2.png



-Pn: It handles all possible, actively hosts online.


VOaOHH.png



-PS/PA/PU/PY:TCP, UDP or SCTP discovery is made to given ports


OVB8zH.png



-PE/PP/PM: Detects timestamp and netmask requests.


bf8IB3.png



-PO Determines the activity and response by pinging the specified devices


N3x7RV.png



-n/-R: Does not query DNS


9VcaB8.png



--dns-servers: DNS servers are determined manually


dT4d1C.png



--system-dns: Uses the operating system's DNS resolver while scanning.


fx3dHA.png



--traceroute: Shows Traceroute details


40PV39.png


Scan Techniques

-sS/sT/sA/sW/sM: Performs TCP/SYN scan / Scans all TCP ports / Detects Firewalls / Performs Window Scan / Performs Maimon Scan



2BdW8I.png



-sU: Performs UDP scan


4Cy9dJ.png



-sN/sF/sX: Performs TCP Null, FIN and Xmas scans


1f81OO.png



--scanflags: Customizes flags in TCP scans


AOIVTH.png



-sI: Perform Idle scans


QP40zC.png



-sY/sZ: Performs SCTP INIT and Cookie scans (echo)


G0a6x2.png



-sO: Adds supported IP Protocols to scanning (UDP, TCP vb.)


aRJGfa.png



-b: Performs FTP Bounce scan


f97Ly1.png



Port Spesification and Scan Order

-p: Scans only specified ports



M6OKRc.png



--exclude-ports: Does not include specified ports in scanning


WNUyW1.png



-F: It scans fewer ports than the default scan mode. (To increase the speed)


N9xcxU.jpg



-r: It scans the ports sequentially.



1ec8V8.png



--top-ports: Scans the specified number of most used ports


d0yKzy.png



--port-ratio: Scans ports that are used more than the specified port number


azc6dU.png


Service/Version Detection

-sV: Detects services and versions of open ports



NcKUM3.png



--version-intensity: Density value is determined in version, version scans


xeKVCJ.png



--version-light: Sets the intensity to 2


07NcJ5.png



--version-all: Sets the scanning density to 9



z7VefT.png



--version-trace: Performs detailed service scan on open ports


eJH0Mx.png


Script Scan

-sC: Performs scanning of the specified script



a5fLPB.png



--script=: Performs multiple script scans


c5xSa9.png



--script-args= Adds arguments to script scans


PRKNWz.png



--script-args-file=filename: Gets arguments from specified files for scripts executed


HLUdHM.png



--script-trace: Shows all data traffic sent and received


x2VC1N.png



--script-updatedb: Updates the script database


IByJa4.png



--script-help=: It shows the parameters for the specified script.



3L6fzf.png


OS Detection

-O: Activates OS detection



K5LWS7.png



--osscan-limit: Limits OS detection


4H7zHP.png


--osscan-guess: It aggressives operating system detection and prediction. (detection probability increases)



5RWW3y.png


Timing and Performance

-T: Sets the timing template. (increasing it, increases the scanning speed)



CWccPx.png



--min-hostgroup/max-hostgroup: Parallel host scanning determines group sizes


dPx5H8.png



--min-parallelism/max-paralellism: Increases scanning speed for bad networks and devices.



GxW8LG.png



--min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout: Determines prob timeout times in port scans



0TfVKe.png



--max-retries: Determines the maximum number of transmissions given to the scanned port


2CTaJ1.png



--host-timeout: The target ip determines the scanning time per device, if the timeout occurs, the target stops scanning.


bNa9VO.png



--scan-delay/--max-scan-delay: Determines the delay between probes


y5OdO7.png



--min-rate:/--max-rate: Determines the number of probes to be sent in 1 second


U83Pad.png


Firewall/IDS Evasion and Spoofing

-f; --mtu: Applies the specified MTU settings



QGCzfQ.png



-D: Uses decoy in browsing


LaVU42.png



-e: Uses the specified interface


A1eK20.png



-g/--source-port: Uses the specified port number


P06SyK.png



--proxies: Transmits the connections through HTTP/SOCKS4 proxies


yxfzAW.png



--data: Adds a special payload to the packets sent


1WaGOJ.png



--data-string: Adds ASCII values ​​to the packets sent


aeHUGC.png



--data-lenght: Adds random data to the packets sent


WUT8CV.png



--ip-options: Sends packages with specified IP features


0MxC9G.png



--ttl: Sets the IP validity time


L89QQ3.png



--spoof-mac: Performs MAC Address spoofing


BNcCaP.png


Output

-oN/-oX/-oS/-oG <file>: Performs nmap scan based on selected file output



zB3IWA.png



-oA: Provides output in 3 different formats at the same time


VGU5MV.png



-v: Detail sets the level of detail. So to speak, it provides many words.


HIK23c.png



-d: Sets the level of debugging


GB6TBd.png



--reason: Shows whether the specified hosts are down and why open ports are open.


2BGB63.png



--open: Shows only open ports


bOMQb0.png



--packet-trace: Shows all packets sent and received


2SGzyK.png



--iflist: Shows host interfaces and network routes (can be used for debugging)


a6dxBO.png



--append-output: Adds to specified output files


dB0bNy.png



--resume: Continues a stopped scan


LzBKA4.png



--stylesheet: XSL stylesheet is used to convert XML outputs to HTML outputs


Q2zNPQ.png



--webxml: References stylesheets from the Nmap website


Td91aI.png



--no-stylesheet: Prevents the use of stylesheets


yKcVUe.png


Misc (Additionally)

-6: Performs IPv6 scan

Kod:
nmap -6 A nmap.org
-A: Enables operating system and version detection, script scanning and route tracking
Kod:
nmap -A 192.168.1.47
--datadir: Customizes the Nmap file d0cuments
Kod:
nmap 192.168.1.47 --datadir folderpath
--send-eth/--send-ip: Sends raw IP packets or ethernet frames
Kod:
nmap 192.168.1.47 --send-eth/ip
--privileged: Assumes user is privileged
Kod:
nmap 192.168.1.47 --privileged
--unprivileged: Assumes user does not have raw socket privileges
Kod:
nmap 192.168.1.47 --unprivileged
-V: Prints the Nmap version number
Kod:
nmap -v
-h: Prints the Help Menu
Kod:
nmap -h



Sources:
https://www.turkhackteam.org/siber-guvenlik/1936406-turkce-nmap-kilavuzu.html
https://tr.wikipedia.org/wiki/Nmap
https://nmap.org/book/man-briefoptions.html
Translator and Editor: Dolyetyus

 
Moderatör tarafında düzenlendi:
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.