NMAP Command Guide Sheet
NMAP Command Guide Sheet
Nmap uses raw IP packets in novel ways to determine what hosts are available on the
network, what services (application name and version) those hosts are offering, what
operating systems (and OS versions) they are running, what type of packet filters/firewalls
are in use, and dozens of other characteristics.
Host discovery – Identifying hosts on a network. For example, listing the hosts
that respond to TCP and/or ICMP requests or have a particular port open.
Port scanning – Enumerating the open ports on target hosts.
Version detection – Interrogating network services on remote devices to
determine application name and version number.
OS detection – Determining the operating system and hardware characteristics of
network devices.
Scriptable interaction with the target
Nmap can provide further information on targets, including reverse DNS names,
device types, and MAC addresses
Install nmap on your kali machine, type command - sudo apt install nmap
In order to run the ifconfig command, we need to have net-tools installed on machine, type
command - sudo apt install net-tools
Basic commands,
Scan a single IP
Scan a host
Scan a port
Target Selection
Port Selection
Scan Types
Output Formats
Scripting Engine