Email Address:
admin@achik.us achikahmed.info@gmail.com
Our Social Media Profiles:
Nmap is a powerful network scanning tool used in Kali Linux to discover devices, scan open ports, detect running services, and gather network information. It is commonly used for network analysis, security testing, and learning how systems communicate over a network. Here’s a list of tasks you can do with Nmap:
Nmap is pre-installed in Kali Linux. If not available, install it using:
sudo apt update && sudo apt install nmap -yCheck version:
nmap --versionBelow commands show how to use Nmap for scanning networks, checking open ports, detecting services, and gathering target information. These commands help perform different types of network scanning and analysis step by step.
Scan a target:
nmap 192.168.1.1Scan a website:
nmap example.comScan multiple targets:
nmap 192.168.1.1 192.168.1.2Scan a range of IP addresses:
nmap 192.168.1.1-100Check open ports:
nmap -p 1-1000 192.168.1.1Fast scan:
nmap -F 192.168.1.1Service version detection:
nmap -sV 192.168.1.1Detect operating system:
nmap -O 192.168.1.1Aggressive scan:
nmap -A 192.168.1.1Ping scan:
nmap -sn 192.168.1.1/24UDP scan:
nmap -sU 192.168.1.1Stealth SYN scan:
nmap -sS 192.168.1.1Save output to file:
nmap -oN result.txt 192.168.1.1Save output in XML:
nmap -oX result.xml 192.168.1.1Nmap Basic Commands help perform common scanning tasks like host discovery, port scanning, service detection, and saving scan results. These commands are useful for learning the basic functions of Nmap in Kali Linux.
Show help menu:
nmap --helpShow version:
nmap --versionCheck local IP address:
ip addrShow all network interfaces:
ifconfigScan from a target list file:
nmap -iL targets.txtSave output to all formats:
nmap -oA result 192.168.1.1Disable ping before scan:
nmap -Pn 192.168.1.1Enable verbose mode:
nmap -v 192.168.1.1Enable very verbose mode:
nmap -vv 192.168.1.1Scan specific ports:
nmap -p 80,443 192.168.1.1Scan top common ports:
nmap --top-ports 100 192.168.1.1Detect firewall:
nmap -sA 192.168.1.1Run default NSE scripts:
nmap -sC 192.168.1.1Run vulnerability scan scripts:
nmap --script vuln 192.168.1.1Show traceroute:
nmap --traceroute 192.168.1.1Exclude a host from scan:
nmap 192.168.1.1/24 --exclude 192.168.1.5Random target scan:
nmap -iR 5Show open ports only:
nmap --open 192.168.1.1Timing template scan:
nmap -T4 192.168.1.1Scan IPv6 target:
nmap -6 example.com