The Software installation environment is Win7, using Zenmap, NMAP6.49BETA2
Scan Host Port
Nmap-t4-a-V 192.168.0.207
Output Result:
Scan entire Subnet
Nmap 192.168.1.1/24
Scan multiple targets:
Nmap 192.168.1.2 192.168.1.5
Load IP list Scan from file
Nmap-il Target.txt
View a list of scanned hosts
NMAP-SL 192.168.1.1/24
Scan a specific port
nmap-p80,21,8080 192.168.0.207
Semi-open scan (without a full TCP handshake)
Nmap-ss 192.168.0.207
Full scan
Nmap-st 192.168.0.207
Scan for Open Udpport
Nmap-su 192.168.0.207
Send a fin flag for a packet
NMAP-SF 192.168.0.207
Ping
NMAP-SP 192.168.0.207
Do not ping
Nmap-o-PN 192.168.1.1/24
Push the operating system
Nmap-o–osscan-guess 192.168.0.207
Version number scan (after port is scanned)
NMAP-SV 192.168.0.207
The Idle scan uses a host that also has a target network to send packets
NMAP-SL 192.168.0.23 192.168.0.207
Additional Options Description:
-A operating system detection
-6 IPv6 test
-T time template, 0-5
-V Add redundancy
-exclude Exclude scan addresses
-exclude the IP address in file exclusion files
Many other reference notes can be viewed here:
Https://svn.nmap.org/nmap/docs/nmap.usage.txt
Nmap Source code Learning four software simple to use