Nmap
Nmap
-6: Enable IPv6 scanning -iL <inputfilename>: Input from list of hosts/networks
-A: Enable OS detection, version detection, script scanning, and traceroute -iR <num hosts>: Choose random targets
--datadir <dirname>: Specify custom Nmap data file location --exclude <host1[,host2][,host3],...>: Exclude hosts/networks
--send-eth/--send-ip: Send using raw ethernet frames or IP packets --excludefile <exclude_file>: Exclude list from file
--unprivileged: Assume the user lacks raw socket privileges Host Discovery
-V: Print version number
-sL: List Scan - simply list targets to scan
-h: Print this help summary page.
-sn: Ping Scan - disable port scan
-oN/-oX/-oS/-oG <file>: Output scan in normal, XML, s|<rIpt kIddi3, and Grepable -PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes
format, respectively, to the given filename.
-PO[protocol list]: IP Protocol Ping
-oA <basename>: Output in the three major formats at once
-n/-R: Never do DNS resolution/Always resolve [default: sometimes]
-v: Increase verbosity level (use -vv or more for greater effect)
--dns-servers <serv1[,serv2],...>: Specify custom DNS servers
-d: Increase debugging level (use -dd or more for greater effect)
--system-dns: Use OS's DNS resolver
--reason: Display the reason a port is in a particular state
--traceroute: Trace hop path to each host
--open: Only show open (or possibly open) ports
--append-output: Append to rather than clobber specified output files -sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans
--noninteractive: Disable runtime interactions via keyboard -sN/sF/sX: TCP Null, FIN, and Xmas scans
--stylesheet <path/URL>: XSL stylesheet to transform XML output to HTML --scanflags <flags>: Customize TCP scan flags
--webxml: Reference stylesheet from Nmap.Org for more portable XML -sI <zombie host[:probeport]>: Idle scan
--no-stylesheet: Prevent associating of XSL stylesheet w/XML output -sY/sZ: SCTP INIT/COOKIE-ECHO scans
Firewall/IDS Evasion & Spoofing -b <FTP relay host>: FTP bounce scan
-S <IP_Address>: Spoof source address -p <port ranges>: Only scan specified ports
-e <iface>: Use specified interface --exclude-ports <port ranges>: Exclude the specified ports from scanning
-g/--source-port <portnum>: Use given port number -F: Fast mode - Scan fewer ports than the default scan
--proxies <url1,[url2],...>: Relay connections through HTTP/SOCKS4 proxies -r: Scan ports sequentially - don't randomize
--data <hex string>: Append a custom payload to sent packets --top-ports <number>: Scan <number> most common ports
--data-string <string>: Append a custom ASCII string to sent packets --port-ratio <ratio>: Scan ports more common than <ratio>
Timing & Performance --version-trace: Show detailed version scan activity (for debugging)
OS Detection
@hackinarticles
-O: Enable OS detection
https://in.linkedin.com/company/hackingarticles