Last modified:
Monday, 8-May-2000 04:13:05 PDT |
nmap V. 2.52_CSW Usage: nmap [Scan Type(s)] [Options]Some Common Scan Types ('*' options require root privileges) -sT TCP connect() port scan (default) * -sS TCP SYN stealth port scan (best all-around TCP scan) * -sU UDP port scan -sP ping scan (Find any reachable machines) * -sF,-sX,-sN Stealth FIN, Xmas, or Null scan (experts only) -sR/-I RPC/Identd scan (use with other scan types) Some Common Options (none are required, most can be combined): * -O Use TCP/IP fingerprinting to guess remote operating system -p ports to scan. Example range: '1-1024,1080,6666,31337' -F Only scans ports listed in nmap-services -v Verbose. Its use is recommended. Use twice for greater effect. -P0 Don't ping hosts (needed to scan www.microsoft.com and others) * -Ddecoy_host1,decoy2[,...] Hide scan using many decoys -T General timing policy -n/-R Never do DNS resolution/Always resolve [default: sometimes resolve] -oN/-oM Output normal/machine parseable scan logs to -iL Get targets from file; Use '-' for stdin * -S /-e Specify source address or network interface --interactive Go into interactive mode (then press h for help) Example: nmap -v -sS -O www.my.com 192.168.0.0/16 '192.88-90.*.*' SEE THE MAN PAGE FOR MANY MORE OPTIONS, DESCRIPTIONS, AND EXAMPLES
amy~>ping microsoft.com PING microsoft.com (207.46.131.137) from 63.192.132.102 : 56 data bytes --- microsoft.com ping statistics --- 11 packets transmitted, 0 packets received, 100% packet loss amy~>
-PS
option causes Nmap to send a SYN packet
probe instead of an ACK. Normally we recommend the default ACK
for stealthiness and firewall penetration reasons. But
-PS
has a strong advantage when combined with Nmap
2.52_CSW: Since SYN is a connection-establishment-request packet,
this probe (which is done against many targets in parallel) can
be used to determine whether the port is open as well as whether
the machine is up. This allows single-port scans to be almost
twice as fast as Nmap 2.52. Example of a high speed scan for web
servers in the 16 million 10.* (internal) addresses:
nmap -sS -PS80 -p80 10.0.0.0/8Note that for this speed optimization to take effect, you must have all three of the arguments (
-sS
,
-PS
, and -p
) , and the port given to 'PS'
and 'p' must match.
-P0
tells Nmap to scan each machine without even
checking if it is up first. This can be very slow (if scanning
thousands of ports), but is the ultimate technique for paranoid
(experienced) security admins.
-sS
argument to perform this kind of scan.
-sU
)
-g
option allows for changing the
source port of a scan.
amy~#nmap -p- -sR -I -O www.secret.com Starting nmap V. 2.52 by fyodor@insecure.org ( insecure.org/nmap/ ) Interesting ports on foo.bar.com (42.43.44.45): (The 65514 ports scanned but not shown below are in state: closed) Port State Service (RPC) Owner 21/tcp open ftp root 22/tcp open ssh root 23/tcp open telnet root 25/tcp open smtp mail 80/tcp open http http 110/tcp open pop-3 root 111/tcp filtered sunrpc 113/tcp open auth root 220/tcp filtered imap3 443/tcp open https http 512/tcp filtered exec 513/tcp filtered login 514/tcp filtered shell 515/tcp filtered printer 516/tcp filtered videotex 517/tcp filtered talk 518/tcp filtered ntalk 635/tcp filtered unknown 939/tcp open (status V1) root 2049/tcp filtered nfs 3600/tcp open unknown root TCP Sequence Prediction: Class=random positive increments Difficulty=4797787 (Good luck!) Sequence numbers: 702A7726 70243971 7059255D 70F3C86B 710DC518 704EBFEE Remote operating system guess: Linux 2.1.122 - 2.2.14 Nmap run completed -- 1 IP address (1 host up) scanned in 467 secondsWhat could be done Better?