1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 |
sudo nmap -O kutayzorlu.com sudo nmap -PN remote_host Specify a range with "-" or "/24" to scan a number of hosts at once: sudo nmap -PN xxx.xxx.xxx.xxx-yyy Scan a network range for available services: sudo nmap -sP network_address_range Scan without preforming a reverse DNS lookup on the IP address specified. This should speed up your results in most cases: sudo nmap -n google.com Scan a specific port instead of all common ports: sudo nmap -p port_number remote_host To scan for TCP connections, nmap can perform a 3-way handshake (explained below), with the targeted port. Execute it like this: sudo nmap -sT google.com To scan for UDP connections, type: sudo nmap -sU google.com Scan for every TCP and UDP open port: sudo nmap -n -PN -sT -sU -p- remote_host A TCP "SYN" scan exploits the way that TCP establishes a connection. sudo nmap -sS google.com A more stealthy sudo nmap -PN -p port_number -sN kz.com sudo nmap -PN -p port_number -sV kz.com |