Scanning Options
Option | What It Does | Example Command |
---|---|---|
| Specifies the target network range. |
|
| Skips port scanning. |
|
| Disables ICMP Echo Requests (no ping). |
|
| Avoids DNS resolution. |
|
| Ping scan using ICMP Echo Requests. |
|
| Shows detailed packet sending/receiving logs. |
|
| Displays the reason for a result. |
|
| Disables ARP Ping. |
|
| Scans the most common ports. |
|
| Scans all ports. |
|
| Scans ports between 22 and 110. |
|
| Scans only ports 22 and 25. |
|
| Scans top 100 most common ports. |
|
| Performs a TCP SYN scan. |
|
| Conducts a TCP ACK scan. |
|
| Runs a UDP scan. |
|
| Scans service versions. |
|
| Uses default scripts for scanning. |
|
| Runs specified scripts during the scan. |
|
| Identifies the target’s operating system. |
|
| OS, service, and traceroute detection. |
|
| Uses 5 random decoys for the scan. |
|
| Specifies the network interface for scanning. |
|
| Sets the source IP address. |
|
| Specifies the source port. |
|
| Uses a custom DNS server for resolution. |
|
Output Options
Option | What It Does | Example Command |
| Saves results in all formats under the given filename. |
|
| Saves results in a normal text format. |
|
| Saves results in a grepable format. |
|
| Saves results in XML format. |
|
Performance Options
Option | What It Does | Example Command |
| Sets the number of retries for failed scans. |
|
| Displays scan progress every 5 seconds. |
|
| Increases verbosity during the scan. |
|
| Sets the initial round-trip timeout value. |
|
| Sets the maximum round-trip timeout value. |
|
| Sets the rate of packets sent per second. |
|
| Chooses the scan timing template (0 = slowest, 5 = fastest). |
|
Script Categories
Category | What It Does | Example Command |
| Tests for authentication weaknesses. |
|
| Discovers hosts via broadcasting. |
|
| Brute-forces logins with common credentials. |
|
| Runs default scripts with the |
|
| Identifies available services. |
|
| Tests for Denial of Service vulnerabilities (risky). |
|
| Attempts to exploit known vulnerabilities. |
|
| Uses external services for data processing. |
|
| Identifies vulnerabilities by sending malformed packets. |
|
| Performs potentially damaging tests. |
|
| Scans for signs of malware infections. |
|
| Safe, non-intrusive defensive scans. |
|
| Detects service versions. |
|
| Scans for specific vulnerabilities. |
|
Post a Comment