A Little nmap Cheat Sheet

nmapWelcome to my little nmap cheat sheet! 

To learn more about nmap – check out my articles: Getting Started with nmap and Deeper Scanning with nmap and Even Deeper Scanning with nmap and Advanced nmap Scripting Engine.

There was no intent here to recreate the full nmap capabilities, that would have been a waste of your and my time. 

Instead, I tried to create a good cheat sheet reference for common/helpful uses of nmap.  Did I miss one or two that really belong here?  Probably.  Please comment below.

For Reference: Usage format: nmap [Scan Type(s)] [Options] {target specification}

For Reference: nmap help: nmap —help

Simple Basic Scan


Look for all devices on a subnet using ARP

nmap -sn

Use a PING scan

nmap -sP   or    nmap -sP 192.168.1.*   or    nmap -sP     or    nmap -sP   

Looking for open ports and OS detection

nmap -sS -P0 -sV -O

  • -sS TCP SYN scan
  • -P0 Looking for IP Protocols by protocol number (ICMP=1, TCP=6, UDP=7, etc)
  • -sV Probe open ports looking for version information
  • -O Enable the OS detection

Don’t wait very long, fast timing

nmap -T5   

OS and version detection

nmap -A   

nmap -A

  • -A OS detection, version detection, script scanning and traceroute

Aggressive and Faster Scanning

nmap -A -T4

  • -A agressive (enables -O and -sV and -sC (script) and –traceroute
  • -T4 faster timing

Look for the top 20 ports   

nmap –top-ports 20

Looking for hosts with specific open port

nmap -sT -p3325 

  • -sT TCP Connect scan
  • -p3325 Try on port 3325

Ducking for cover – a TCP SYN Scan with decoy source IP

nmap -sS -D,   

  • -sS TCP SYN scan
  • -D  {decoy IP addresses}

To do a verbose scan

nmap -v   

To Scan fewer ports (100), and exclude a couple devices, with exclusion

nmap -F –exclude,   

To Scan skipping the ping, and do the rest of the scanning on every port address

nmap -Pn

Add IPv6 address to Linux system

ifconfig eth0 inet6 add 2001:db8:cafe:1::1/64 

Now use nmap to scan the IPv6 address

nmap -6 2001:db8:cafe:1::1    

To see interfaces available on the system

nmap –iflist   

Use nmap to do a UDP based ping:

nmap -PU 

To do a UDP port scan:

nmap -sU   

You can even spoof the MAC address

nmap –spoof-mac 0 

nmap Scripting Engine  (NSE)

nmap –script={script name}

To see help with scripts

nmap –script-help {script name}
nmap –script=default
same as
nmap -sC

Version information

nmap –script=version

Vulnerability Scan

nmap –script=vuln

Combining scripts

nmap –script “safe or default”   
nmap –script “discovery and version”

Scripts that execute attacks:

nmap –script=brute
nmap –script=dos
nmap –script=exploit
nmap –script=malware

Leave a Comment

Contact Us Here

Please verify.
Validation complete :)
Validation failed :(
Your contact request has been received. We usually respond within an hour, but please be patient. We will get back to you very soon.
Scroll to Top