Warning: Use of undefined constant BLOGUPLOADDIR - assumed 'BLOGUPLOADDIR' (this will throw an Error in a future version of PHP) in /home/enadeg5/public_html/wp-content/themes/Avada/framework/plugins/revslider/inc_php/base.class.php on line 71

Warning: Declaration of Post_Types_Order_Walker::start_lvl(&$output, $depth) should be compatible with Walker::start_lvl(&$output, $depth = 0, $args = Array) in /home/enadeg5/public_html/wp-content/themes/Avada/framework/plugins/post-types-order/post-types-order.php on line 344

Warning: Declaration of Post_Types_Order_Walker::end_lvl(&$output, $depth) should be compatible with Walker::end_lvl(&$output, $depth = 0, $args = Array) in /home/enadeg5/public_html/wp-content/themes/Avada/framework/plugins/post-types-order/post-types-order.php on line 344

Warning: Declaration of Post_Types_Order_Walker::start_el(&$output, $page, $depth, $args) should be compatible with Walker::start_el(&$output, $object, $depth = 0, $args = Array, $current_object_id = 0) in /home/enadeg5/public_html/wp-content/themes/Avada/framework/plugins/post-types-order/post-types-order.php on line 344

Warning: Declaration of Post_Types_Order_Walker::end_el(&$output, $page, $depth) should be compatible with Walker::end_el(&$output, $object, $depth = 0, $args = Array) in /home/enadeg5/public_html/wp-content/themes/Avada/framework/plugins/post-types-order/post-types-order.php on line 344

Warning: Cannot modify header information - headers already sent by (output started at /home/enadeg5/public_html/wp-content/themes/Avada/framework/plugins/revslider/inc_php/base.class.php:71) in /home/enadeg5/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1648

Warning: Cannot modify header information - headers already sent by (output started at /home/enadeg5/public_html/wp-content/themes/Avada/framework/plugins/revslider/inc_php/base.class.php:71) in /home/enadeg5/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1648

Warning: Cannot modify header information - headers already sent by (output started at /home/enadeg5/public_html/wp-content/themes/Avada/framework/plugins/revslider/inc_php/base.class.php:71) in /home/enadeg5/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1648

Warning: Cannot modify header information - headers already sent by (output started at /home/enadeg5/public_html/wp-content/themes/Avada/framework/plugins/revslider/inc_php/base.class.php:71) in /home/enadeg5/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1648

Warning: Cannot modify header information - headers already sent by (output started at /home/enadeg5/public_html/wp-content/themes/Avada/framework/plugins/revslider/inc_php/base.class.php:71) in /home/enadeg5/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1648

Warning: Cannot modify header information - headers already sent by (output started at /home/enadeg5/public_html/wp-content/themes/Avada/framework/plugins/revslider/inc_php/base.class.php:71) in /home/enadeg5/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1648

Warning: Cannot modify header information - headers already sent by (output started at /home/enadeg5/public_html/wp-content/themes/Avada/framework/plugins/revslider/inc_php/base.class.php:71) in /home/enadeg5/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1648

Warning: Cannot modify header information - headers already sent by (output started at /home/enadeg5/public_html/wp-content/themes/Avada/framework/plugins/revslider/inc_php/base.class.php:71) in /home/enadeg5/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1648
{"id":100,"date":"2013-10-07T03:33:31","date_gmt":"2013-10-07T03:33:31","guid":{"rendered":"http:\/\/theipzone.com\/?p=100"},"modified":"2013-10-07T03:34:41","modified_gmt":"2013-10-07T03:34:41","slug":"nmap-cheat-sheet","status":"publish","type":"post","link":"http:\/\/theipzone.com\/blog\/2013\/10\/07\/nmap-cheat-sheet\/","title":{"rendered":"NMAP Cheat Sheet"},"content":{"rendered":"

Scan an IPv4 host\/address<\/p>\n

nmap 192.168.1.1<\/pre>\n

Scan an IPv6 host\/address<\/p>\n

nmap -6 2607:f8b0:4007:804::1009\r\nnmap -v A -6 2607:f8b0:4007:804::1009<\/pre>\n

Scan FQDN<\/p>\n

nmap server1.cyberciti.biz<\/pre>\n

Scan a host name with more info<\/p>\n

nmap -v server1.cyberciti.biz<\/pre>\n

Scan a range of IP address<\/p>\n

nmap 192.168.1.1-20\r\nnmap 192.168.1.*\r\nnmap 192.168.1.0\/24\r\nnmap 192.168.1.1,2,3\r\nnmap 192.168.1.1 192.168.1.2<\/pre>\n

Read list of hosts\/networks from a file<\/p>\n

nmap -iL \/tmp\/test.txt<\/pre>\n

Excluding hosts\/networks (IPv4)<\/p>\n

nmap 192.168.1.0\/24 --exclude 192.168.1.5\r\nnmap 192.168.1.0\/24 --exclude 192.168.1.5,192.168.1.254\r\nnmap -iL \/tmp\/scanlist.txt --excludefile \/tmp\/exclude.txt<\/pre>\n

Turn on OS and version detection scanning script (IPv4)<\/p>\n

nmap -A 192.168.1.254\r\nnmap -v -A 192.168.1.1\r\nnmap -A -iL \/tmp\/scanlist.txt<\/pre>\n

Find out if a host\/network is protected by a firewall<\/p>\n

nmap -sA 192.168.1.254<\/pre>\n

Scan a host when protected by the firewall<\/p>\n

nmap -PN 192.168.1.1<\/pre>\n

Scan a network and find out which servers and devices are up and running<\/p>\n

nmap -sP 192.168.1.0\/24<\/pre>\n

Perform a fast scan<\/p>\n

nmap -F 192.168.1.1<\/pre>\n

Display the reason a port is in a particular state<\/p>\n

nmap --reason 192.168.1.1<\/pre>\n

Only show open (or possibly open) ports<\/p>\n

nmap --open 192.168.1.1<\/pre>\n

Show all packets sent and received<\/p>\n

nmap --packet-trace 192.168.1.1<\/pre>\n

Show host interfaces and routes (netsat -nr)<\/p>\n

nmap --iflist<\/pre>\n

Scan specific ports<\/p>\n

nmap -p 80 192.168.1.1\r\nnmap -p 80,443 192.168.1.1\r\nnmap -p 80-200 192.168.1.1\r\nnmap -p T:80 192.168.1.1\r\nnmap -p U:53 192.168.1.1\r\nnmap -p U:53,111,137,T:21-25,80,139,8080 192.168.1.1\r\nnmap -v -sU -sT -p U:53,111,137,T:21-25,80,139,8080 192.168.1.254\r\nnmap --top-ports 5 192.168.1.1<\/pre>\n

Fastest way to scan all your devices\/computers for open ports<\/p>\n

nmap -T5 192.168.1.0\/24<\/pre>\n

Detect remote operating system<\/p>\n

nmap -O 192.168.1.1\r\nnmap -O --osscan-guess 192.168.1.1\r\nnmap -v -O --osscan-guess 192.168.1.1<\/pre>\n

Detect remote services (server \/ daemon) version numbers<\/p>\n

nmap -sV 192.168.1.1<\/pre>\n

Scan a host using TCP ACK (PA) and TCP Syn (PS) ping<\/p>\n

nmap -PS 192.168.1.1\r\nnmap -PS 80,21,443 192.168.1.1\r\nnmap -PA 192.168.1.1\r\nnmap -PA 80,21,200-512 192.168.1.1<\/pre>\n

Scan a host using IP protocol ping<\/p>\n

nmap -PO 192.168.1.1<\/pre>\n

Scan a host using UDP ping<\/p>\n

nmap -PU 192.168.1.1\r\nnmap -PU 2000.2001 192.168.1.1<\/pre>\n

Stealthy scan<\/p>\n

nmap -sS 192.168.1.1<\/pre>\n

Find out the most commonly used TCP ports using TCP ACK scan<\/p>\n

nmap -sA 192.168.1.1<\/pre>\n

Find out the most commonly used TCP ports using TCP Window scan<\/p>\n

nmap -sW 192.168.1.1<\/pre>\n

Find out the most commonly used TCP ports using TCP Maimon scan<\/p>\n

nmap -sM 192.168.1.1<\/pre>\n

Find out the most commonly used TCP ports using TCP connect scan<\/p>\n

nmap -sT 192.168.1.1<\/pre>\n

Scan a host for UDP services (UDP scan)<\/p>\n

nmap -sU 192.168.1.1<\/pre>\n

Scan for IP protocol<\/p>\n

nmap -sO 192.168.1.1<\/pre>\n

Scan a firewall for security weakness. TCP Null Scan to fool a firewall to generate a response
\n Does not set any bits (TCP flag header is 0) <\/p>\n

nmap -sN 192.168.1.254<\/pre>\n

TCP Fin scan to check firewall. Sets just the TCP FIN bit <\/p>\n

nmap -sF 192.168.1.254<\/pre>\n

TCP Xmas scan to check firewall. Sets the FIN, PSH, & URG flags, lighting the packet up like a Christmas tree <\/p>\n

nmap -sX 192.168.1.254<\/pre>\n

Scan a firewall for packets fragments<\/p>\n

nmap -f 192.168.1.1<\/pre>\n

Set your own offset size with the –mtu option <\/p>\n

nmap --mtu 32 192.168.1.1<\/pre>\n

Cloak a scan with decoys<\/p>\n

nmap -n -Ddecoy-ip1,decoy-ip2,your-own-ip,decoy-ip3,decoy-ip4 remote-host-ip\r\nnmap -n -D192.168.1.5,10.5.1.2,172.1.2.4,3.4.2.1 192.168.1.5<\/pre>\n

Spoof your MAC address<\/p>\n

nmap --spoof-mac MAC-ADDRESS-HERE 192.168.1.1<\/pre>\n

Add other options<\/p>\n

nmap -v -sT -PN --spoof-mac MAC-ADDRESS-HERE 192.168.1.1<\/pre>\n

Use a random MAC address. The number 0, means nmap chooses a completely random MAC address <\/p>\n

nmap -v -sT -PN --spoof-mac 0 192.168.1.1<\/pre>\n

Save output to a text file<\/p>\n

nmap 192.168.1.1 > output.txt\r\nnmap -oN \/tmp\/filename 192.168.1.1\r\nnmap -oN output.txt 192.168.1.1<\/pre>\n

Find host MAC address (can only be done on same LAN segment)<\/p>\n

sudo nmap -sP -n 192.168.0.1\r\nsudo nmap -sP -n 192.168.0.0\/24<\/pre>\n","protected":false},"excerpt":{"rendered":"

Scan an IPv4 host\/address nmap 192.168.1.1 Scan an IPv6 host\/address nmap -6 2607:f8b0:4007:804::1009 nmap -v A -6 2607:f8b0:4007:804::1009 Scan FQDN nmap server1.cyberciti.biz Scan a host name with more info nmap -v server1.cyberciti.biz Scan a range of IP address nmap 192.168.1.1-20 nmap 192.168.1.* nmap 192.168.1.0\/24 nmap 192.168.1.1,2,3 nmap 192.168.1.1 192.168.1.2 Read list of hosts\/networks from a file nmap -iL \/tmp\/test.txt Excluding hosts\/networks (IPv4) nmap 192.168.1.0\/24 –exclude 192.168.1.5 nmap 192.168.1.0\/24 –exclude 192.168.1.5,192.168.1.254 nmap -iL \/tmp\/scanlist.txt –excludefile \/tmp\/exclude.txt Turn on OS and version detection scanning script (IPv4) nmap -A 192.168.1.254 nmap -v -A 192.168.1.1 nmap -A -iL \/tmp\/scanlist.txt Find out if a host\/network is protected by a firewall nmap -sA 192.168.1.254 Scan a host when protected by the firewall nmap -PN 192.168.1.1 Scan a network and find out which servers and devices are up and running nmap -sP 192.168.1.0\/24 Perform a fast scan nmap -F 192.168.1.1 Display the reason a port is in a particular state nmap –reason 192.168.1.1 Only show open (or possibly open) ports nmap –open 192.168.1.1 Show all packets sent and received nmap –packet-trace 192.168.1.1 Show host interfaces and routes (netsat -nr) nmap –iflist Scan specific ports nmap -p 80 192.168.1.1 nmap -p 80,443 192.168.1.1 nmap -p 80-200 192.168.1.1 nmap -p T:80 192.168.1.1 nmap -p U:53 192.168.1.1 nmap -p U:53,111,137,T:21-25,80,139,8080 192.168.1.1 nmap -v -sU -sT -p U:53,111,137,T:21-25,80,139,8080 192.168.1.254 nmap –top-ports 5 192.168.1.1 Fastest way to scan all your devices\/computers for open ports nmap -T5 192.168.1.0\/24 Detect remote operating system nmap -O 192.168.1.1 nmap -O –osscan-guess 192.168.1.1 nmap -v -O –osscan-guess 192.168.1.1 Detect remote services (server \/ daemon) version numbers nmap -sV 192.168.1.1 Scan a host using TCP ACK (PA) and TCP Syn (PS) ping nmap -PS 192.168.1.1 nmap -PS 80,21,443 192.168.1.1 nmap -PA 192.168.1.1 nmap […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3],"tags":[32,5],"_links":{"self":[{"href":"http:\/\/theipzone.com\/wp-json\/wp\/v2\/posts\/100"}],"collection":[{"href":"http:\/\/theipzone.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/theipzone.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/theipzone.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/theipzone.com\/wp-json\/wp\/v2\/comments?post=100"}],"version-history":[{"count":9,"href":"http:\/\/theipzone.com\/wp-json\/wp\/v2\/posts\/100\/revisions"}],"predecessor-version":[{"id":109,"href":"http:\/\/theipzone.com\/wp-json\/wp\/v2\/posts\/100\/revisions\/109"}],"wp:attachment":[{"href":"http:\/\/theipzone.com\/wp-json\/wp\/v2\/media?parent=100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/theipzone.com\/wp-json\/wp\/v2\/categories?post=100"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/theipzone.com\/wp-json\/wp\/v2\/tags?post=100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}