You are on page 1of 1

TCP Connect scanning for localhost and network 192.168.0.0/24 # nmap -v -sT localhost # nmap -v -sT 192.168.0.

0/24 nmap TCP SYN (half-open) scanning # nmap -v -sS localhost # nmap -v -sS 192.168.0.0/24 nmap TCP FIN scanning # nmap -v -sF localhost # nmap -v -sF 192.168.0.0/24 nmap TCP Xmas Useful to see # nmap -v -sX # nmap -v -sX nmap TCP Null Useful to see # nmap -v -sN # nmap -v -sN tree scanning if firewall protecting against this kind of attack or not: localhost 192.168.0.0/24 scanning if firewall protecting against this kind attack or not: localhost 192.168.0.0/24

nmap TCP Windows scanning # nmap -v -sW localhost # nmap -v -sW 192.168.0.0/24 nmap TCP RPC scanning Useful to find out RPC (such as portmap) services # nmap -v -sR localhost # nmap -v -sR 192.168.0.0/24 nmap UDP scanning Useful to find out UDP ports # nmap -v -O localhost # nmap -v -O 192.168.0.0/24 nmap remote software version scanning You can also find out what software version opening the port. # nmap -v -sV localhost # nmap -v -sV 192.168.0.0/24

You might also like