Default Scan
Scan top 1000 ports on all IP Addresses
Same as -sT
Scan (TCP Full Scan)
Ping Scan (Host Discovery)
Check whether an host is up (Host Discovery)
Makes use of ICMP packets which could be filtered by Firewalls
The results returned by Ping Sweep is not very accurate. Active devices are sometimes not detected
No Ping Scan
Host is assumed to be online (No Host Discovery)
Top 1000 ports is scanned
Useful if ICMP packets are filtered
OS Detection & Service Versioning Scan
Noisy scans can be easily detected by firewalls and IDS
TCP Connect (Full Open) Scan
Slower than SYN Scan. Can be easily detected
3-Way Handshake is performed with the target before reset packet is sent
Stealth Scan (SYN Scan)
Fast scan and can evade firewall detection
Only half 3-Way Handshake is performed and then immediately reset
SYN-ACK Response: Open
RST Response: Closed
Unreachable: Filtered
UDP Scan
If the port is closed the service will respond using an ICMP (ping) packet
UDP scan is significantly slower than TCP scans
UDP is a connection-less protocol so it does not send back ACK packets
Nmap has to wait for a long period before making the decision it port is open
No Response: Port Open or Filtered
Unreachable: Port Closed or Filtered
Output Scan Results
-oN
: Human readable Output
-oX
: XML Output
-oG
: Greapable Output
-oA
: All Format
Inverse TCP Flag Scanning
FIN Scan: Sets just the TCP FIN bit
XMAS Scan: Sets the FIN, PSH, and URG flags
NULL Scan: Does not set any bits (TCP flag header is 0)
No Response: Open/ Filtered
RST Response: Closed
Unreachable: Filtered
Windows & Cisco - Network Stack
The Network stack on these servers do not know how to respond
RST packet is sent for malformed packet even if port is open These scans are extremely stealthyDoes not support these scans