Skip to content

How To Use Nmap

Published: at 10:00 AMSuggest Changes

Nmap Usage Notes

This document provides a structured overview of various Nmap commands, detailing their usage, functionality, and insights.

1️⃣ Aggressive Scan (-A)

Try it:

nmap -v -A scanme.nmap.org

How It Works:

Example Output (Shortened):

Nmap scan report for scanme.nmap.org (45.33.32.156)
Host is up (0.12s latency).
Not shown: 994 closed ports
PORT      STATE SERVICE VERSION
22/tcp    open  ssh     OpenSSH 6.6.1p1 Ubuntu
80/tcp    open  http    Apache httpd 2.4.7

🔍 Insight:

Reveals open ports, services, OS, and traceroute for the target.

2️⃣ Ping Sweep (-sn)

Try it (LAN Discovery):

nmap -v -sn 192.168.1.0/24

(Replace with your actual subnet if needed)

How It Works:

Example Output (Shortened):

Nmap scan report for 192.168.1.1 (Router)
Host is up (0.0012s latency).
Nmap scan report for 192.168.1.100 (Laptop)
Host is up (0.0009s latency).

🔍 Insight:

Great for finding all devices connected to a network without scanning ports.

3️⃣ Random IP Scan (-iR)

Try it (Caution: Random Public IPs!)

nmap -v -iR 10 -Pn -p 80

(Scans 10 random IPs for open HTTP servers)

How It Works:

Example Output (Shortened):

Nmap scan report for 192.168.1.10
Host is up.
PORT   STATE SERVICE
80/tcp open  http

🔍 Insight:

Useful for finding web servers worldwide, but it can trigger firewall alerts if misused!

🔹 Summary Table

CommandPurposeKey Flags
nmap -v -A scanme.nmap.orgAggressive scan with OS, services, scripts, traceroute-A, -v
nmap -v -sn 192.168.0.0/16Find live hosts without scanning ports-sn, -v
nmap -v -iR 10 -Pn -p 80Scan 10 random IPs for open port 80-iR, -Pn, -p

Nmap Scan Report for iichevit.com

Overview

This report summarizes the results of an Nmap scan conducted on the domain iichevit.com. The scan was performed using Nmap version 7.80 and provides insights into the open ports and services running on the host.

Scan Details

Scan Results

Explanation of Scanning 1000 Ports

Nmap, by default, scans the 1,000 most common ports for both TCP and UDP protocols. This selection is based on the following considerations:

Open Ports Identified

In this scan, two ports were found to be open:

Conclusion

The Nmap scan of iichevit.com successfully identified two open ports, providing insight into the services available on the host. For a more comprehensive analysis, users can perform additional scans targeting specific ports or all ports as needed.

Nmap Command Explanation

The command nmap -oG - 172.17.37.0-255 -vv > Result performs a network scan with specific options. Here’s a breakdown:

Summary

Nmap Command Explanation

The command nmap -oG - 172.17.37.0-255 -p 22 -vv > Resulti performs a targeted network scan with specific options. Here’s a breakdown:

Summary

Nmap Aggressive Scan Overview

The command nmap -A scanme.nmap.org performs an aggressive scan on the target scanme.nmap.org. Here’s a concise breakdown:

Summary

Nmap Fast Scan Overview

The command nmap -F scanme.nmap.org executes a fast scan on the target scanme.nmap.org. Here’s a brief breakdown:

Summary

Nmap Fast Scan for Multiple Targets

The command nmap -F schemcon2024.com schemcon2025.com > schemcon performs a fast scan on two specified domains. Here’s a concise breakdown:

Summary

Nmap Open Ports Scan

The command nmap --open www.github.com performs a scan to identify open ports on the specified target. Here’s a brief breakdown:

Summary

Nmap Aggressive Scan with Timing

The command nmap -T4 -A -v scanme.nmap.org performs an aggressive scan with a specified timing template. Here’s a concise breakdown:

Summary


Next Post
How to Build Netscan