TCP scan open ports (three way handshake)

nmap -sT -v [ip]


Service detection

nmap -sV -v [ip]

Checks running services, version number = exploit


Aggressive scan

nmap -A 10.10.1.* - scan subnet or IP range

Agressive scan supports - -O (OS detection) -sV, -sC and –traceroute


Port scan if firewall is enabled

Stealth scan - half open to bypass
nmap -sS -v 10.10.1.22


xmas scan - send TCP frame with FIN, URG andPUSH flags. If port closed it will send RST

nmap -sX -v [ip]


TCP maimon scan, FIN/ACK, chec if port is Open Filtered

nmap -sM -v [ip]


TCP ACK scan - understand if port is filtered or unfiltered (stateful firewall is present)

nmap -sA -v [ip]

ACK flag probe, no response implies that port is filtered and RST means port is not filtered


UDP scan to check UDP services like DNS 53, DHCP, TFTP etc.

nmap -sU [ip]


IDLE/IPID scan with spoofed source address

nmap -sl -v [ip]


SCPT INIT

nmap -sY -v


SCTP COOKIE ECHO Scan

nmap -sZ -v [ip]