nmap is a powerful network scanning tool that can be used to discover hosts and services on a network, as well as to scan for vulnerabilities and to gain information about a network’s configuration. Here is a list of some common nmap scanning options:
-sS
: TCP SYN scan (also known as a stealth scan)-sT
: TCP connect scan-sU
: UDP scan-sN
: TCP Null scan-sF
: TCP FIN scan-sX
: TCP Xmas scan-sA
: TCP ACK scan-sW
: TCP Window scan-sM
: TCP Maimon scan-sI
: TCP idle scan-sL
: List scan (scan for live hosts only)-sO
: IP protocol scan-sV
: Version detection-A
: Enable OS detection, version detection, script scanning, and traceroute-Pn
: Treat all hosts as online (skip host discovery)-p
: Specify ports to scan-iL
: Specify a file containing a list of targets--exclude
: Exclude a host or range of hosts from the scan--excludefile
: Exclude a list of hosts from the scan
This is just a small selection of the options available in nmap. For a complete list of options, you can consult the nmap documentation or use the --help
flag when running nmap from the command line.