top of page
Cyberbugs provide VAPT Services , Security Services &  cyber securityTraining and ethical hacking training

TOP 10 NMAP Commands And Tutorials

Updated: Feb 18, 2022

NMAP Commands

In this post we are going to learn about n map commands.

Network security is very important if hackers access your network so they can do many many malicious activities such as sniffing, session hijacking, also hack your computer systems which are connected to the network and also perform DOS attacks.

An open-source vulnerability scanner, Nmap is a free, free tool for scanning networks and finding vulnerabilities. A network administrator uses Nmap to identify what devices are running on their systems, find out what services are available from each host and identify open ports.

The Nmap tool can monitor both single hosts as well as large networks that contain hundreds of thousands of devices and tens of thousands of subnets.

Pentesters and ethical hackers use Nmap to scan networks and identify weaknesses. It also supports a wide variety of scripts that can be run to scan for vulnerability, brute force attacks, DoS attacks, http scanning, and so on.

Nmap scans each and every port, for example, firewall, is listening for responses and determining whether ports are open, closed or filtered. Port enumeration and discovery are other terms for port scanning.

Click here to know more bout Nmap commands.

In the ethical hacking phase, NMAP commands is used for scanning. The scanning is part of the third phase, and it was very important to run NMAP during this phase.

Basic Nmap Commands:

1] Port Scanning

Command: nmap

You can have multiple domains or IP

Command: nmap

You can use this command to scan ports on your network. You will put a website or IP address

scan port using nmap

2] Scan All 65,535 Ports In The Network.

Command: nmap -p-

You can use this command to scan 65535 ports on your network. You will put a website or IP address.

Scan All 65,535 Ports In The Network.

3] Aggressive Scan

Command: nmap -A

You can use this command to scan Aggressive. You can gather versions, banner, port information, OS information and so on. You will put a website or IP address.

nmap Aggressive Scan

4] Ping Scan

Command: nmap -sP

There is an extensive list of NMAP commands. If you want to use Nmap for ping scanning, several examples can be listed

There are several ways to execute port scanning using Nmap. The most commonly used are these:

# sS TCP SYN scan

# sT TCP connect scan

# sU UDP scans

# sY SCTP INIT scan


nmap Ping Scan

5] Scanning IP Range

Command: nmap

The first thing you should do is check your IP address with ifconfig and set the range to 0/23 to scan all the IP addresses connected to your network. Also, check the website's IP address to find more IP addresses.

Nmap Scanning IP Range

6] Scanning Vulnerability Using Nmap Script

Command: nmap --script=vuln

Nmap use various scripts. This script is used to scan for vulnerabilities on your target.

Nmap Scanning Vulnerability Using Nmap Script

7] Scanning Single Port

Command: nmap -p 80

This command is used to scan a single port in a network you can target and scan a specific port using this command

Nmap Scanning Single Port

8] Operating System Scanning

Command: nmap -O

This command is use to scan operating system in network. This command is shows guessing and in rare case they show actual target OS it is depending upon systems to systems.

Nmap Operating System Scanning Command

9] Save Nmap Scanning Report In TXT File

Command: nmap -oN result.txt

This command is use to save your scanning results.

Save Nmap Scanning Report In TXT File

10] Scan Using Default Safe Scripts

Command: nmap -sC -sV

Using this command you can scan default safe scripts

Nmap Scan Using Default Safe Scripts

In addition to protecting your system from hackers, Nmap allows you to detect any security vulnerabilities within your network. However, whether or not port scans on external servers are legal is another issue altogether. This is a complex area of law that varies by territory. Make sure you research the legal aspects of using Nmap before you start scanning external ports widely. Using Nmap to scan external ports could result in your ISP banning you, so make sure you research all possibilities before you start using it.

So, this was everything about nmap commands, now if you like this tutorial then must share it with your friends and needy one.

If you want to learn ethical hacking or a penetration testing visit our website

Cyberbugs is a best cyber security courses training provider in Nagpur,India and other native countries

By Abhishek joshi


Recent Posts

See All


bottom of page