Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

🏠 Back to Blog

Nmap Cheatsheet

Basic Scan Types

ScanCommandPurpose
Ping Scannmap -sn <target>Check if host is up.
SYN Scannmap -sS <target>Stealthy fast TCP scan.
Service Version Scannmap -sV <target>Scan service version of open ports.
Connect Scannmap -sT <target>Full TCP handshake; accurate but noisy.
UDP Scannmap -sU <target>Scan UDP ports (slow).
Version Scannmap -sV <target>Identify service versions.
OS Detectionnmap -O <target>Guess OS.
Aggressive Scannmap -A <target>OS, version, scripts, traceroute.

Port Selection

OptionMeaning
-p 22Scan one port
-p 22,80,443Scan list
-p 1-65535Scan range
-p-Scan all ports
--top-ports=10Scan most common ports
-FFast scan (top 100)

Important Flags

FlagDescription
-PnNo host discovery; treat host as up
-nNo DNS resolution
--disable-arp-pingDisable ARP ping
--packet-traceShow all sent/received packets
--reasonExplain port states
-T4Faster timing template
--stats-every=5s Show stats every 5 seconds

Port States

StateMeaning
openAccepts connections
closedResponds with RST
filteredBlocked by firewall
unfilteredReachable, state unknown
open|filteredNo response
closed|filteredIdle scan ambiguity

Useful Examples

Scan Top 10 TCP Ports

nmap --top-ports=10 <target>

Full TCP + UDP + Version + OS

nmap -sS -sU -sV -O <target>

Packet Trace Example

nmap -p 21 --packet-trace -Pn -n --disable-arp-ping <target>

Service Enumeration

nmap -sV -p <port> <target>