Port scanning
Theory
Practice
SCAN TECHNIQUES
-sS/sT/sA: TCP SYN/Connect()/ACK scans
-sU: UDP Scan
PORT SPECIFICATION AND SCAN ORDER
-p <port ranges>: Only scan specified ports
Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080
-F: Fast mode - Scan 100 most common
--top-ports <number>: Scan <number> most common ports
TIMING AND PERFORMANCE
-T<0-5>: Set timing template (higher is faster)
Templates (0-5): paranoid|sneaky|polite|normal|aggressive|insane
SERVICE/VERSION DETECTION
-sV: Probe open ports to determine service/version info
SCRIPT SCAN
-sC: equivalent to --script=default
HOST DISCOVERY
-Pn: Treat all hosts as online -- skip host discovery
FIREWALL/IDS EVASION AND SPOOFING
-f; --mtu <val>: fragment packets (optionally w/given MTU)
-S <IP_Address>: Spoof source address
-e <iface>: Use specified interface
OUTPUT
-oN/-oX/-oS/-oG <file>: Output scan in normal, XML, s|<rIpt kIddi3,
and Grepable format, respectively, to the given filename.
-oA <basename>: Output in the three major formats at once
-v: Increase verbosity level (use -vv or more for greater effect)Resources
Last updated
Was this helpful?