Of course, what we are doing with nmap so far is only the tip of the iceberg. Nmap allows for customization of scans to a very high degree. Let's look at a few options.
To execute a NULL scan, select NULL from the list in the nmap window in the NetHunter app and enter the target IP address:
On this line, you can enter the ports you wish to scan in different ways, such as a range; we are using the -p switch to indicate we are scanning specific ports, and then we follow it with ports 21, 22, and 45 and the IP address of the target:
21,22,45
Another option is to scan a range of ports, for example, ports 1 to 100:
1-100
Want to scan specific ports and detect the OS and services? Nmap would send a series of both TCP and UDP datagrams to the target device; each response is carefully...