NMAP CODES
NMAP's Some Commands
nmap -sT -sV -v -v -v -n --min-hostgroup 6 --min-parallelism 56 --min-rate 1000 -Pn www.examplesite.com
nmap -sS --osscan-limit --packet-trace --top-ports 10 --version-intensity 0-4 xxx.xxx.xxx.xxx
nmap -O -A -Pn --open --packet-trace www.examplesite.com
## The single IP is scanning ##
nmap 192.168.0.0
## Scan a host name ##
nmap www.examplesite.com
## Host name with more info ##
nmap -v www.site.com
## Multiple scanning ##
The IP addresses
nmap 192.168.1.1 22.15.2.2 88.1.3.5
Range of IP
nmap 192.168.1.1-20
Range of IP with "*" sign
nmap 192.168.0.*
Entire subnet
nmap 192.168.0.0/24
## Excluding Hosts/Networks ##
nmap 192.168.1.0/24 --exclude 192.168.1.5
## OS Scanning ##
nmap -A 192.168.0.0 //Turn on OS detection scanning
nmap -v -A 192.168.0.0 //OS and its version
nmap -sA 192.168.0.0 //...protected by a firewall?
nmap -PN 192.168.1.2 //scanning when protected by the firewall.
nmap -O 192.168.0.0
nmap -v -O --osscan-guess 192.168.1.1
## Host discovery or the other named ping scan ##
nmap -sP 192.168.1.0/24
## Firewall weakness scan ##
nmap -sN 192.xxx.xxx.xxx //TCP Null scan to fool a firewall to generate a response
nmap -sF 192.xxx.xxx.xxx //TCP FIN scan to check firewall
nmap -sX 192.xxx.xxx.xxx //TCP Xmas scan to check firewall
##Scan a Firewall for packets fragments##
nmap -f 192.168.1.1 //-f fragment packets
MAC Spoofing
nmap -v -sT -PN --spoof-mac MAC-ADDRESS-HERE 192.168.1.1
nmap -v -sT -PN --spoof-mac 0 192.168.1.1 //The number 0, means nmap chooses a completely random MAC address
## Advanced nmap ##
Comments