nmap is a powerful network scanning tool that can be used to discover hosts and services on a network, as well as to scan for vulnerabilities and to gain information about a network’s configuration. Here is a list of some common nmap scanning options:
-sS: TCP SYN scan (also known as a stealth scan)-sT: TCP connect scan-sU: UDP scan-sN: TCP Null scan-sF: TCP FIN scan-sX: TCP Xmas scan-sA: TCP ACK scan-sW: TCP Window scan-sM: TCP Maimon scan-sI: TCP idle scan-sL: List scan (scan for live hosts only)-sO: IP protocol scan-sV: Version detection-A: Enable OS detection, version detection, script scanning, and traceroute-Pn: Treat all hosts as online (skip host discovery)-p: Specify ports to scan-iL: Specify a file containing a list of targets--exclude: Exclude a host or range of hosts from the scan--excludefile: Exclude a list of hosts from the scan
This is just a small selection of the options available in nmap. For a complete list of options, you can consult the nmap documentation or use the --help flag when running nmap from the command line.
