0% found this document useful (0 votes)
12 views

Nmap Commands

The document provides instructions for using Nmap to perform various discovery and bypass scans against IP addresses, including port scanning, OS detection, service version detection, and techniques for bypassing firewalls and IDS systems such as packet fragmentation and source address manipulation. It also describes using the Nmap Scripting Engine and Zenmap for additional scanning functionality and creating a network diagram.

Uploaded by

Ronak Makwana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Nmap Commands

The document provides instructions for using Nmap to perform various discovery and bypass scans against IP addresses, including port scanning, OS detection, service version detection, and techniques for bypassing firewalls and IDS systems such as packet fragmentation and source address manipulation. It also describes using the Nmap Scripting Engine and Zenmap for additional scanning functionality and creating a network diagram.

Uploaded by

Ronak Makwana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

(1)itmbu.ac.in : 108.167.146.

199
(2)scanme.org : 45.33.32.156

Host Discovery:

ARP Ping Scan : nmap -sP -PR 108.167.146.199


UDP Ping Scan : nmap -sP -PU 108.167.146.199
ICMP Ping Scan(Echo) : nmap -sP -PE 108.167.146.199
ICMP Ping Scan(Timestamp) : nmap -sP -PP 108.167.146.199
ICMP Ping Scan(Address mask) : nmap -sP -PM 108.167.146.199
TCP Ping Scan(SYN) : nmap -sP -PS 108.167.146.199
TCP Ping Scan(ACK) : nmap -sP -PA 108.167.146.199
IP Protocol Scan : nmap -sP -PO 108.167.146.199

Port and Service Discovery:

TCP connect/Full Open scan : nmap -sT 108.167.146.199


Stealth Scan/TCP Half Open scan : nmap -sS 108.167.146.199
Xmas Scan : nmap -sX 108.167.146.199
TCP Maimon scan : nmap -sM 108.167.146.199
ACK Flag prob scan : nmap -sA 108.167.146.199
UDP Scan : nmap -sU 108.167.146.199
Service Version Discovery Scan : nmap -sV 108.167.146.199
Scan whole subnet using Aggressive Scan : nmap -A 108.167.146.199

OS Discovery : nmap -sV -O 108.167.146.199

TTL & Window Size :


Nmap Script Engine (NSE) : nmap -sC 108.167.146.199

IDS/Firewall Bypass:

Scan Beyond IDS/Firewall using various Evason Techniques:

1. Packet fragmentation : nmap -f 108.167.146.199


2. source port manipulation : nmap -g 80 108.167.146.199
3. source address manipulation : nmap -S 108.167.146.199
4. IP Adress Decoy : nmap -D RND:10 108.167.146.199
nmap -D 108.167.146.199,108.167.146.200,108.167.146.198

Scan Beyond IDS/Firewall using Nmap by creating custom packets

1. creating custom packets by appending custom binary data:


nmap 108.167.146.199 --data 0xdeadbeef
2. creating custom packets by appending custom strings:
nmap 108.167.146.199 --data-string "D0nt G1v3 UP"
3. creating custom packets by appending random data:
nmap 108.167.146.199 --data-length 4

Network Diagram using Network topology Mapper

using zenmap

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy