Is this tool helful in finding the vulnerability or is it just for
scanning purpose?

how to attck using nmap?


On Jun 1, 8:59 pm, Ravi Gopal <[email protected]> wrote:
> #1:*For beginners to start with here is the basics of nmap*:
>
>             ===========================
> Syntax:  nmap <Type of Scan> <options> Target
>             ===========================
>
> *<Scan types>*
> *Types of Scan** **Option*
> SYN scan -sS
> UDP scan -sU
> TCP Scan -sT
> ACK scan -sA
> FIN scan -sF
> Null scan -sN
> XMas Scan -sX
>
> *Note:* FIN,NULL and XMas scans are called as stealth scans.
> There are other types of scans also like icmp Echo, ping scan, Idle scan
> etc. Please refer to NMAP documentation/help for more types.
>
> *<Options>*
> -p<port range> --> port range can be single port or multiple ports separated
> by commas or range of ports (EX: -p23 OR
>                                         -p23,25,110,3389 OR -p1-65535)
> -sV Version         --> displays the version of the service running (Ex: IIS
> 6.0)'
> -O  Operating System --> OS fingerprinting
> -T(0-5) Timing option --> ideally -T4 is preferable for faster scan with
> optimum performance
> -PN host discovery skip --> This option is very useful when you are sure
> that target is up/alive
>
> *Target:*
> Target can be either IP address or netmask or Website
>
> Here are few Exaples:
>
> *nmap -sS -O -p1-65535 192.168.0.34*
> *nmap -sS -sV -p23,80-110,3389 192.168.0.34*
> *nmap -sS -sV -p23 192.168.0-5.1-254*
>
> *<< My Observations:*
> *Nmap scan on Linux operating system is faster than the scan on windows
> operating systems >>*
>
> Regards,
> Ravi Gopal
>
>
>
> On Tue, Jun 1, 2010 at 2:37 AM, Sandeep Thakur <[email protected]> wrote:
> > Thanks Naik for passing us the nmap cheatsheet. Pls find the below
> > link which is interesting and can give you little depths of how nmap
> > works or process the commands...
>
> >http://haymanezzeldin.blogspot.com/2008/03/nmap-detection-and-counter...
>
> > Regards
> > Sandeep Thakur
>
> > On May 31, 10:56 am, Srinivas Naik <[email protected]> wrote:
> > > Hey,
>
> > > Further Scans is disclosed in this attached CheatSheet.
>
> > > Regards,
> > > Srinivas Naik
>
> > > On Sun, May 30, 2010 at 10:42 PM, N41K <[email protected]> wrote:
> > > > Hi,
>
> > > >  Shall we have discussion on NMAP, as there are many Network Security
> > > > Experts in our community.
>
> > > > Lets list out what all can be discussed .
>
> > > > Policy compliance scan
> > > > # nmap -vv –PA80 –PE –PS23 –sS –iL input.lst --excludefile banned.lst
> > > > -A --osscan_limit –F –R -oA policy_check
>
> > > > Firewall Audit
> > > > # nmap -vv –P0 –sA –iL input.lst --excludefile banned.lst –r -n -oA
> > > > firewall
>
> > > > Regards,
> > > > 0xN41K
>
> > >  Nmap5_cheatsheet.pdf
> > > 497KViewDownload
>
> > --
> > You received this message because you are subscribed to the Google Groups
> > "nforceit" group.
> > To post to this group, send an email to [email protected].
> > To unsubscribe from this group, send email to
> > [email protected]<nforceit%[email protected]­om>
> > .
> > For more options, visit this group at
> >http://groups.google.com/group/nforceit?hl=en-GB.- Hide quoted text -
>
> - Show quoted text -

-- 
You received this message because you are subscribed to the Google Groups 
"nforceit" group.
To post to this group, send an email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/nforceit?hl=en-GB.

Reply via email to