Mastering Network Discovery : A Comprehensive Guide to Nmap Commands and Scanning Techniques

Larbi OUIYZME
3 min readOct 3, 2023

--

Introduction

In the realm of network reconnaissance and security assessment, Nmap stands as a venerable and indispensable tool. Network Mapper, or Nmap for short, is an open-source utility that has become synonymous with network scanning and mapping. In this article, we will provide a comprehensive guide to Nmap commands and various scanning methods to empower you with the knowledge to navigate your network landscape effectively.

Reminder : Always ensure you have the proper permissions and legal authorization before conducting network scans. In the dynamic world of network security, Nmap remains an indispensable ally in the quest for a secure and well-managed network environment.

Nmap Basics : Commands for the Essentials

Ping Scan (Ping Sweep) :

  • Command : nmap -sn [target]
  • Purpose : Detect live hosts on the network without scanning open ports.
  • Usage Example : nmap -sn 192.168.1.0/24

TCP Connect Scan (Full Open Scan) :

  • Command : nmap -sT [target]
  • Purpose : Perform a TCP three-way handshake to determine open ports.
  • Usage Example : nmap -sT 192.168.1.100

UDP Scan :

  • Command : nmap -sU [target]
  • Purpose : Scan for open UDP ports on the target.
  • Usage Example : nmap -sU 192.168.1.200

Service and Version Detection :

  • Command : nmap -sV [target]
  • Purpose : Attempt to identify the service and version running on open ports.
  • Usage Example : nmap -sV 192.168.1.50

Aggressive Scan :

  • Command : nmap -A [target]
  • Purpose : Enable OS detection, version detection, and script scanning.
  • Usage Example : nmap -A 192.168.1.10

Scan Specific Ports :

  • Command : nmap -p [port(s)] [target]
  • Purpose : Scans only the specified port(s) on the target.
  • Usage Example : nmap -p 80,443 192.168.1.30

Scan Port Ranges :

  • Command : nmap -p [start-end] [target]
  • Purpose : Scans a range of ports on the target.
  • Usage Example : nmap -p 1–100 192.168.1.40

Scripting Engine : NSE Scripting

  • Command : nmap -sC [target]
  • Purpose : Runs default NSE scripts to gather more information.
  • Usage Example : nmap -sC 192.168.1.60

Scripting Engine : Custom NSE Script

  • Command : nmap — script [script-name] [target]
  • Purpose : Runs a specific NSE script for advanced scanning and testing.
  • Usage Example : nmap — script http-enum 192.168.1.70

Output Options : Save Results to a File

  • Command : nmap -oN [output.txt] [target]
  • Purpose : Saves scan results to a text file.
  • Usage Example : nmap -oN scan_results.txt 192.168.1.80

Output Options : XML Output

  • Command : nmap -oX [output.xml] [target]
  • Purpose : Saves scan results in XML format for further analysis.
  • Usage Example : nmap -oX scan_results.xml 192.168.1.90

Scanning Methods : Techniques for In-Depth Analysis

TCP SYN Scan (Stealth Scan)

  • Command : nmap -sS [target]
  • Purpose : Send SYN packets to target ports and listen for responses to identify open ports.
  • Usage Example : nmap -sS 192.168.1.200

TCP ACK Scan :

  • Command : nmap -sA [target]
  • Purpose : Identify stateful firewalls by sending ACK packets to various ports.
  • Usage Example : nmap -sA 192.168.1.50

TCP Null, FIN, and Xmas Scans :

  • Commands : Null Scan : nmap -sN [target] , FIN Scan : nmap -sF [target] or Xmas Scan : nmap -sX [target]
  • Purpose : Send packets with specific flags (null, FIN, or Christmas tree flags) to probe open ports.
  • Usage Examples : Null Scan : nmap -sN 192.168.1.60 , FIN Scan : nmap -sF 192.168.1.70 or Xmas Scan: nmap -sX 192.168.1.80

TCP Window Scan :

  • Command : nmap -sW [target]
  • Purpose : Examine the size of the TCP window in response packets to determine open, closed, or filtered ports.
  • Usage Example : nmap -sW 192.168.1.90

TCP Maimon Scan (Half-Open Scan) :

  • Command : nmap -sM [target]
  • Purpose : Probe open ports using different flag combinations, useful for evading certain firewall rules that detect SYN scans.
  • Usage Example : nmap -sM 192.168.1.110

Conclusion

Nmap, with its rich array of commands and scanning methods, offers network administrators, penetration testers, and security professionals an unparalleled toolset for uncovering network vulnerabilities, mapping network topology, and improving overall network security. Understanding when and how to use these commands and scanning techniques is essential for efficient and responsible network scanning practices.

--

--

Larbi OUIYZME
Larbi OUIYZME

Written by Larbi OUIYZME

I'm Larbi, from Morocco. IT trainer and Chief Information Security Officer (CISO), I'm committed to share knowledge. Also, Ham Radio CN8FF passionate about RF

No responses yet