Nmap is a powerful network scanning tool used to discover hosts and services on a computer network. It is a free and open source tool that can be used to audit and secure networks. Nmap commands are used to scan networks for security vulnerabilities, detect open ports, and identify the operating system and services running on a host. This article will provide an overview of 17 basic Nmap commands for Linux network administrators. These commands can be used to quickly scan a network for open ports, detect operating systems, and identify services running on a host. Additionally, these commands can be used to detect security vulnerabilities and help secure a network.
Nmap Commands – 17 Basic Commands for Linux Network
Scanning
1. nmap -sV – Scan target for open ports and services
2. nmap -sC – Scan target using default scripts
3. nmap -sS – Scan target using SYN scan
4. nmap -sU – Scan target using UDP scan
5. nmap -A – Scan target using OS and version detection
6. nmap -O – Scan target for OS detection
7. nmap -p – Scan target for specific port range
8. nmap -sL – List all hosts in a network
9. nmap -sI – Scan target using a zombie host
10. nmap -sR – Scan target using reverse DNS resolution
11. nmap -n – Scan target without resolving DNS
12. nmap -sT – Scan target using TCP connect scan
13. nmap -sX – Scan target using Xmas scan
14. nmap -PN – Scan target without pinging
15. nmap -sV –version-intensity – Scan target with version intensity
16. nmap –top-ports – Scan target for top ports
17. nmap –script
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.