nmap -p- -v -sV -sC -T4 -Pn --open -oA scan -iL scope.txt
nmap -iL ip.txt -v -sV -T4 --open -oA ./output --script smb-vuln*,smtp-open-relay,mysql-empty-password,ms-sql-empty-password,ftp-anon
nmap -p 80,443,8000,8080,8180,8888,10000 192.168.1.3 # Port seçme (Web Ports)
nmap --top-ports 100 192.168.1.3
nmap -p- 192.168.1.3 # Bütün portlar
nmap --open 192.168.1.3 # Sadece acik portlari goster
nmap -Pn 192.168.1.3 # Ping atma
nmap -sU 192.168.1.3 # UDP scan
nmap -sV 192.168.1.3 # Version scan
nmap -sV -sC 192.168.1.3 # Script scan
nmap -sV -O 192.168.1.3 # OS detection
nmap --script vuln 192.168.1.3 # Vuln Scan
nmap --script-updatedb # update db
nmap -T4 192.168.1.3 # Script hızı
nmap -oN scan.txt 192.168.1.3 # Output
nmap -oX scan.xml 192.168.1.3 # Output
nmap -iL scope.txt # Input
nmap -oA ./scan
xsltproc scan.xml -o test.html
nmap --script-help "*mysql*"
ls -l /usr/share/nmap/scripts/*snmp*
nmap -S 192.168.1.1 -e tun0 -Pn 192.168.1.3 # Source IP adresini değiştirir (Firewall Bypass)
nmap -D RND:5 192.168.1.3 # Decoy ile tarama yapar (Firewall Bypass)
nmap --source-port 53 192.168.1.3 # Source Port (Firewall Bypass)
nmap --min-rate 4500 --max-rtt-timeout 1500ms 192.168.1.3 # Abartı hız
Eğer portları çok hızlı taramak isterseniz bu komutu kullanabilirsiniz. Sonuçlar bazen yanıltıcı olabilir.
masscan --rate=10000 <IP>
rustscan --ulimit 5000 -a 192.168.1.3
for i in $(seq 1 254); do nc -zv -w 1 172.16.50.$i 445; done