Skip to content
Business IT Services, Support Melbourne
  • IT Services
    • Managed IT Services
    • Cloud Services
    • Microsoft 365 Managed Service
    • IT Consulting Services
    • Remote IT Support
    • Business Communication
      • Get started with 3CX
  • Industries
    • Accounting Firms
    • Law Firms
    • Realestate
    • Medical Centres
    • Pharmacies
    • Conveyancing Firms
  • Cybersecurity
    • SaaS Security
    • Assessment
    • The Essential Eight
      • Quick Assessment
    • Playbooks
    • Computer Security Threats
  • Remote IT Support
    • TeamViewer Windows
    • TeamViewer Mac
    • TeamViewer Linux
Get in Touch

Windows

23
  • Command and PowerShell History
  • How to increase the disk size of VM in VirtualBox
  • Saved Windows Credentials
  • View installed software using wmic
  • How to Disable Revocation Check for SSTP VPN
  • Enabling Group Policy editor on Windows 10 Home
  • Source file names are larger than supported file system
  • How to change file creation or modified date
  • Another account from your organisation is already signed in
  • How to check if Microsoft Defender for Endpoint is running
  • Disabling Office 365 Autodiscover – Exchange Self hosted
  • Access to Removable Drives not Protected by BitLocker
  • The Group Policy settings for BitLocker startup options are in conflict and cannot be applied
  • How do you extend a User Profile Disk
  • Resizing User Virtual Disk RDP (Esxi VM)
  • Essential Network Ports for Windows Services
  • Why does OneDrive keep duplicating files
  • Troubleshooting USB devices
  • Download Maps Manager Delayed Start Red in Server 2016
  • Pros and cons working with DNS, DHCP, IPAM, Wireless, LAN, WAN
  • What is a DHCP Servers and DHCP relays
  • How to find user profile disk from registry
  • Understanding Multi-Factor Authentication
Linux

Linux

8
  • Rsync linux
  • CSF Shell Command
  • mysql-8.0-gpg package error
  • Linux Exim Cheat sheet
  • csf configserv commands
  • Nmap cheat sheet
  • nmap
  • Windows Privilege Escalation

Networking

4
  • Cannot access FortiGate web GUI admin interface
  • How to find Fortinet PSK
  • Pros and cons working with DNS, DHCP, IPAM, Wireless, LAN, WAN
  • Disabling SIP ALG on FortiGate Firewall

General IT Support

12
  • TPM has malfunction error 80090016 keyset does not exist
  • Command and PowerShell History
  • How to increase the disk size of VM in VirtualBox
  • Saved Windows Credentials
  • View installed software using wmic
  • How to improve the WIFI coverage in the office
  • Best Practices for Data Backup and Recovery
  • How to change file creation or modified date
  • How to sync a SharePoint site with OneDrive
  • Cannot access FortiGate web GUI admin interface
  • Pros and cons working with DNS, DHCP, IPAM, Wireless, LAN, WAN
  • What is a DHCP Servers and DHCP relays

Network Connectivity

4
  • How to improve the WIFI coverage in the office
  • Common Internet connectivity problems and solutions
  • What is SSTP VPN?
  • Enabling iPhone hotspot

Cyber Security & Compliance

3
  • How to check if Microsoft Defender for Endpoint is running
  • The Group Policy settings for BitLocker startup options are in conflict and cannot be applied
  • Windows Privilege Escalation

Remote IT Support & Helpdesk

5
  • Atera client not showing up in Customer’s dashboard
  • The Group Policy settings for BitLocker startup options are in conflict and cannot be applied
  • How do you extend a User Profile Disk
  • Resizing User Virtual Disk RDP (Esxi VM)
  • mysql-8.0-gpg package error
View Categories
  • Home
  • kb
  • Linux
  • Nmap cheat sheet

Nmap cheat sheet

5

Nmap Cheat Sheet: From Beginner to Expert Pentesters

Basic Scanning #

  • Scan a single host:bashCopyEditnmap 192.168.1.1
  • Scan multiple hosts:bashCopyEditnmap 192.168.1.1 192.168.1.2 192.168.1.3
  • Scan a subnet:bashCopyEditnmap 192.168.1.0/24
  • Scan a range of IPs:bashCopyEditnmap 192.168.1.1-100
  • Scan a domain:bashCopyEditnmap example.com

Port Scanning #

  • Scan common ports (default):bashCopyEditnmap -F 192.168.1.1
  • Scan specific ports:bashCopyEditnmap -p 22,80,443 192.168.1.1
  • Scan all 65,535 ports:bashCopyEditnmap -p- 192.168.1.1
  • Scan UDP ports:bashCopyEditnmap -sU -p 53,161 192.168.1.1
  • Scan top 1000 ports faster:bashCopyEditnmap --top-ports 100 192.168.1.1

Advanced Scanning #

  • Service and version detection:bashCopyEditnmap -sV 192.168.1.1
  • OS detection:bashCopyEditnmap -O 192.168.1.1
  • Aggressive scan (OS, version, scripts, traceroute):bashCopyEditnmap -A 192.168.1.1
  • Scan with NSE (Nmap Scripting Engine):bashCopyEditnmap --script=vuln 192.168.1.1

Firewall Evasion & Stealth Scanning #

  • Fragment packets to bypass IDS/IPS:bashCopyEditnmap -f 192.168.1.1
  • Randomize scan order:bashCopyEditnmap -r 192.168.1.1
  • Decoy scan (confuses IDS):bashCopyEditnmap -D RND:10 192.168.1.1
  • Scan with spoofed source IP:bashCopyEditnmap -S 192.168.1.100 192.168.1.1
  • Scan using a fake MAC address:bashCopyEditnmap --spoof-mac 00:11:22:33:44:55 192.168.1.1
  • Idle scan (completely stealthy):bashCopyEditnmap -sI zombie_host 192.168.1.1

Bypassing Firewalls #

  • Use NULL scan (no TCP flags):bashCopyEditnmap -sN 192.168.1.1
  • Use FIN scan:bashCopyEditnmap -sF 192.168.1.1
  • Use XMAS scan:bashCopyEditnmap -sX 192.168.1.1
  • Use slow scan to avoid detection:bashCopyEditnmap -T2 192.168.1.1
  • Use an HTTP proxy to scan:bashCopyEditnmap --proxies http://proxy:8080 192.168.1.1

NSE (Nmap Scripting Engine) #

  • Detect vulnerabilities:bashCopyEditnmap --script=vuln 192.168.1.1
  • Check for SMB vulnerabilities:bashCopyEditnmap --script=smb-vuln* 192.168.1.1
  • Run multiple scripts:bashCopyEditnmap --script=http-enum,ftp-anon 192.168.1.1
  • Scan for CVE exploits:bashCopyEditnmap --script=vulners 192.168.1.1

Network Mapping & Host Discovery #

  • List live hosts (no port scan):bashCopyEditnmap -sn 192.168.1.0/24
  • Find open ports without pinging first:bashCopyEditnmap -Pn 192.168.1.1
  • Traceroute with Nmap:bashCopyEditnmap --traceroute 192.168.1.1

Saving and Exporting Results #

  • Save output in normal format:bashCopyEditnmap -oN output.txt 192.168.1.1
  • Save output in XML format:bashCopyEditnmap -oX output.xml 192.168.1.1
  • Save output in all formats:bashCopyEditnmap -oA scan_results 192.168.1.1
  • View Nmap XML output in a readable format:bashCopyEditcat output.xml | xsltproc -o output.html

Scan Timing and Performance #

  • Scan as fast as possible:bashCopyEditnmap -T5 192.168.1.1
  • Paranoid scan (avoiding detection):bashCopyEditnmap -T0 192.168.1.1
  • Aggressive scan (faster but noisy):bashCopyEditnmap -T4 192.168.1.1

Evading Intrusion Detection Systems (IDS) #

  • Use random port scanning:bashCopyEditnmap -p- -T2 --randomize-hosts 192.168.1.1
  • Scan with minimum packets per second:bashCopyEditnmap --min-rate 10 192.168.1.1

Detecting Honeypots #

  • Check for honeypots:bashCopyEditnmap --script=honeypot-detect 192.168.1.1

Brute-Forcing with NSE #

  • Brute force SSH login:bashCopyEditnmap --script=ssh-brute -p 22 192.168.1.1
  • Brute force HTTP authentication:bashCopyEditnmap --script=http-brute -p 80 192.168.1.1
  • Brute force MySQL login:bashCopyEditnmap --script=mysql-brute -p 3306 192.168.1.1

Related Docs

  • Windows Privilege Escalation
  • nmap
Share This Article :
  • Facebook
  • X
  • LinkedIn
  • Pinterest
csf configserv commandsnmap
Table of Contents
  • Basic Scanning
  • Port Scanning
  • Advanced Scanning
  • Firewall Evasion & Stealth Scanning
  • Bypassing Firewalls
  • NSE (Nmap Scripting Engine)
  • Network Mapping & Host Discovery
  • Saving and Exporting Results
  • Scan Timing and Performance
  • Evading Intrusion Detection Systems (IDS)
  • Detecting Honeypots
  • Brute-Forcing with NSE
Melbourne business IT logo

Melbits is Melbourne Business IT Service and technology solutions provider. Our tailored and strategic approach ensures that your business will receive expert IT support, cybersecurity and consulting that aligns with your business needs, empowering your business, driving growth and success.

You can reach us at 03 9069 6788

IT Services

  • Managed IT Services
  • Cloud Services
  • Cybersecurity
  • Remote IT Services
  • Business Communication
  • IT Consulting

Industries

  • Accounting Firms
  • Law Firms
  • Realestate
  • Medical Centres
  • Pharmacies
  • Conveyancing Firms

Additional Links

  • About Us
  • Knowledge Base
  • Case Studies
  • Blog
  • Contact
  • FAQ

© 2025 Melbit Services, All Rights Reserved.

  • Terms and Conditions
  • Privacy Policy