NMAP, which stands for “Network Mapper,” is a free, open-source tool used for network discovery and auditing. Such commands can help you audit your network security, discover available hosts, find out open ports, service versions, and more.
1. Basic command: This is the simplest command to use while scanning the network. It’s merely `nmap
1. Scan multiple targets: If you wish to scan multiple targets at the same time, use `nmap
1. Scan a range of IPs: To do this, utilize the command `nmap
1. Detect the Operating System and Services: You can use the `-O` option in your command for OS Detection. For example, `nmap -O 192.168.1.1`.
1. Scan with a specific port: You can use the `-p` option in your command for port scanning. For example, `nmap -p 80 192.168.1.1`.
1. Scan all TCP ports: Use `-p-` in your command. Example: `nmap p 192.168.1.1`.
1. Scan using TCP connect: You can do this by using the `-sT` option. For example, `nmap -sT 192.168.1.1`.
1. Scan UDP ports: The `-sU` option will perform a UDP scan. For example, `nmap -sU 192.168.1.1`.
1. Perform a fast scan: The option `-F` is used for a fast scan. It only scan fewer ports compared to a comprehensive scan. For example, `nmap -F 192.168.1.1`.
It is essential to note that using NMAP efficiently and correctly requires command-line proficiency. You should be careful while using NMAP, as it may sometimes be considered illegal on certain networks.
These are a few of the many NMAP commands you can use. You can always refer to the NMAP manual by using the `man nmap` command in Linux, or by visiting the official NMAP documentation on their website for a more comprehensive understanding.
Sources:
1. https://www.guru99.com/nmap-tutorial.html
2. https://nmap.org/book/man.html
3. https://geekflare.com/nmap-command-examples/