Scan_de_ports_(avancé)
Scan de ports (avancé)
sudo nmap -sN MACHINE_IP
TCP Null Scan
sudo nmap -sF MACHINE_IP
TCP FIN Scan
sudo nmap -sX MACHINE_IP
TCP Xmas Scan
sudo nmap -sM MACHINE_IP
TCP Maimon Scan
sudo nmap -sA MACHINE_IP
TCP ACK Scan
sudo nmap -sW MACHINE_IP
TCP Window Scan
sudo nmap --scanflags URGACKPSHRSTSYNFIN MACHINE_IP
Custom TCP Scan
sudo nmap -S SPOOFED_IP MACHINE_IP
Spoofed Source IP
--spoof-mac SPOOFED_MAC
Spoofed MAC Address
nmap -D DECOY_IP,ME MACHINE_IP
Decoy Scan
sudo nmap -sI ZOMBIE_IP MACHINE_IP
Idle (Zombie) Scan
-f
Fragment IP data into 8 bytes
-ff
Fragment IP data into 16 bytes
--source-port PORT_NUM
specify source port number
--data-length NUM
append random data to reach given length
These scan types rely on setting TCP flags in unexpected ways to prompt ports for a reply. Null, FIN, and Xmas scan provoke a response from closed ports, while Maimon, ACK, and Window scans provoke a response from open and closed ports.
--reason
explains how Nmap made its conclusion
-v
verbose
-vv
very verbose
-d
debugging
-dd
more details for debugging
Last updated