Port scanning

Types of scans

Port Scan Type

Example Command

TCP Connect Scan

nmap -sT

TCP SYN Scan

sudo nmap -sS

UDP Scan

sudo nmap -sU

TCP Null Scan

sudo nmap -sN

TCP FIN Scan

sudo nmap -sF

TCP Xmas Scan

sudo nmap -sX

TCP Maimon Scan

sudo nmap -sM

TCP ACK Scan

sudo nmap -sA

TCP Window Scan

sudo nmap -sW

Custom TCP Scan

sudo nmap –scanflags URGACKPSHRSTSYNFIN

Spoofed Source IP

sudo nmap -S SPOOFED_IP

Spoofed MAC Address

–spoof-mac SPOOFED_MAC

Decoy Scan

nmap -D DECOY_IP,ME

Idle (Zombie) Scan

sudo nmap -sI ZOMBIE_IP

Fragment IP data into 8 bytes

-f

Fragment IP data into 16 bytes

-ff

Options

Option

Purpose

-p-

all ports

-p1-1023

scan ports 1 to 1023

-F

100 most common ports

-r

scan ports in consecutive order

-T<0-5>

T0 being the slowest and T5 the fastest

–max-rate 50

rate <= 50 packets/sec

–min-rate 15

rate >= 15 packets/sec

–min-parallelism 100

at least 100 probes in parallel

–source-port PORT_NUM

specify source port number

–data-length NUM

append random data to reach given length

Null, FIN, and Xmas scan provoke a response from closed ports, while Maimon, ACK, and Window scans provoke a response from open and closed ports.

Option

Purpose

–reason

explains how Nmap made its conclusion

-v

verbose

-vv

very verbose

-d

debugging

-dd

more details for debugging


Last update: 2025-05-12 14:16