NMAP, an acronym for Network Mapper, is an extremely advanced tool that can be used for the following purposes:
- Host discovery
- Service detection
- Version enumeration
- Vulnerability scanning
- Firewall testing and evasion
NMAP is a tool with hundreds of parameters to configure and covering it completely is beyond the scope of this book. However, the following table will help you to know some of the most commonly required NMAP switches:
Sr. no.
|
NMAP switch
|
Purpose
|
1. | -sT | Perform a connect (TCP) scan |
2. | -sU | Perform a scan to detect open UDP ports |
3. | -sP | Perform a simple ping scan |
4. | -A | Perform an aggressive scan (includes stealth syn scan and OS and version detection plus traceroute and scripts) |
5. | -sV | Perform service version detection |
6. | -v | Print verbose output |
7. | -p 1-1000 | Scan ports only in range 1 to 1000 |
8. | -O | Perform OS detection |
9. | -iL <filename... |