Nmap can be obtained on the official website
https://nmap.org/
I use the Nmap binary package to compile the installation under Linux
After decompression, execute in file directory
./configure--prefix=/usr/local/nmapmakemake Installalias Nmap=/usr/local/nmap/bin/nmap
Complete the installation
Using Nmap under Linux
Parameters:
-pn:treat all hosts as online--skip host discovery
All hosts as online processing-skip host Discovery
-sn:ping scan-disable Port Scan
Ping sweep surface--port scan failure
-SU:UDP Scan
UDP scan
-ss:tcp SYN
Using SYN half-open scanning, this scanning method makes the scan result more correct (also known as semi-open, or stealth scanning)
-P <port ranges>: only scan specified ports
Ex:-p22; -p1-65535; -P U:53,111,137,t:21-25,80,139,8080,s:9
Port scan
-a:enable OS detection, version detection, script scanning, and traceroute
Enable operating system fingerprinting and version detection at the same time
-v:increase verbosity level (USE-VV or more for greater effect)
Show detailed scanning process (-VV more detailed)
-o:enable OS Detection
Uppercase o stands for OS judgment host operating system
SCAN Techniques:
-ss/st/sa/sw/sm:tcp Syn/connect ()/ack/window/maimon Scans
-SU:UDP Scan
-sn/sf/sx:tcp Null, FIN, and Xmas scans
--scanflags <flags>: Customize TCP Scan Flags
-si <zombie host[:p robeport]>: Idle scan
-SY/SZ:SCTP Init/cookie-echo Scans
-SO:IP Protocol Scan
-B <ftp relay Host>: FTP Bounce Scan
This article is from the "rime" blog, please be sure to keep this source http://kinrey.blog.51cto.com/10492082/1771446
Installation and use of Nmap under Linux