Nmap CHEAT SHEET

The Nmap cheat sheet is a one-page reference sheet for the famous Network Mapper tool.

networkscanport
6
Sections
7
Cards

#Getting Started

Basic Usage :
# set your target in etc/hosts

# fast scan of all port of your target
nmap -p- -T5 target 

# fast scan on port 80 with os detection  
namp -p, 80 -T5 -O target 
Basic Options :
OptionsPurpose
-p-all ports
-p1-1023scan ports 1 to 1023
-F100 most common ports
-rscan ports in consecutive order
-T<0-5>-T0 being the slowest and T5 the fastest
--max-rate 50rate <= 50 packets/sec
--min-rate 15rate >= 15 packets/sec
--min-parallelism 100at least 100 probes in parallel

#Nmap Intermediate Options

Service Detections :
OptionMeaning
--tracerouterun traceroute to target
--script=SCRIPTSNmap scripts to run
-sC or --script=defaultrun default scripts
-OOS detection
-sVService version detection
-Aequivalent to -sV -O -sC --traceroute
Timing
OptionMeaning
-T<0-5>Timing template – paranoid (0), sneaky (1), polite (2), normal (3), aggressive (4), and insane (5)
--min-parallelism <numprobes> and --max-parallelism <numprobes>Minimum and maximum number of parallel probes
--min-rate <number> and --max-rate <number>Minimum and maximum rate (packets/second)
--host-timeoutMaximum amount of time to wait for a target host

#Formating answers

Details & Report
OptionPurpose
--reasonexplains how Nmap made its conclusion
-vverbose
-vvvery verbose
-ddebugging
-ddmore details for debugging
-oN <filename>Normal output
-oX <filename>XML output
-oG <filename>grep-able output
-oA <basename>Output in all major formats

#Advanced Technic

Advanced Scan
OptionsProtocolMain FunctionTypical Use Case
-PR -snARPScanDiscovering devices on the local network (LAN)
-PE -snICMPEcho ScanChecking if hosts are reachable (pinging)
-PP -snICMPTimestamp ScanGathering device time info (less common)
-PM -snICMPAddress Mask ScanDetermining subnet mask info from hosts
-PS -snTCPSYN Ping ScanDetecting open TCP ports and live hosts
-PA -sn TCPACK Ping ScanIdentifying firewall rules and open ports
-PU -snICMPPing ScanFinding hosts with open UDP services

#Investigation Exemple

Verbose Os Quick port scan
nmap -sV -O -p- -T5 target 
 
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-11-02 15:17 CET

Nmap scan report for target (10.10.158.161)
Host is up (0.021s latency).
Not shown: 65532 closed tcp ports (reset)

PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 7.2p2 Ubuntu 4ubuntu2.8 (Ubuntu Linux; protocol 2.0)
8009/tcp open  ajp13   Apache Jserv (Protocol v1.3)
8080/tcp open  http    Apache Tomcat 8.5.5

Aggressive OS guesses: Linux 3.10 - 3.13 (95%), Linux 5.4 (95%), ASUS RT-N56U WAP (Linux 3.4) (95%),
Linux 3.16 (95%), Linux 3.1 (93%), Linux 3.2 (93%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (93%), 
Sony Android TV (Android 5.0) (93%), Android 5.0 - 6.0.1 (Linux 3.4) (93%), Android 5.1 (93%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 39.94 seconds


# you can then use `nmap -A -p 22, 8009, 8080 target` on discovered ports

Do not use this tool without consent. For educational purposes, this example is coming from a Try Hack Me machine.

#Also See