Class: Nmap::Command
- Inherits:
-
CommandMapper::Command
- Object
- CommandMapper::Command
- Nmap::Command
- Defined in:
- lib/nmap/command.rb
Overview
Nmap options:
Target Specifications:
-iL path/to/file-nmap.target_file = "path/to/file"-iR 10-nmap.random_targets = 10--exclude host1 --exclude host2-nmap.exclude = ["host1", "host2"--excludefile path/to/file-nmap.exclude_file = "path/to/file"
Host Discovery:
-sL-nmap.list = true-sn-nmap.ping = true-Pn-nmap.skip_discovery = true-PS-nmap.syn_discovery = [20..80, 443]-PA-nmap.ack_discovery = [20..80, 443]-PU-nmap.udp_discovery = [20..80, 443]- '-PY' -
nmap.sctp_init_ping = [20..80, 443] -PE-nmap.icmp_echo_discovery = true-PP-nmap.icmp_timestamp_discovery = true-PM-nmap.icmp_netmask_discovery = true-PO-nmap.ip_ping = [1, 2, 3, 4, ...]-PR-nmap.arp_ping = true--traceroute-nmap.traceroute = true-n-nmap.disable_dns = true-R-nmap.enable_dns = true--resolve-all-nmap.resolve_all = true--unique-nmap.unique = true--dns-servers nameserver1,nameserver2-nmap.dns_servers = ["nameserver1", "nameserver2"]--systems-dns-nmap.systems_dns = true
Port Scanning Techniques:
-sS-nmap.syn_scan = true-sT-nmap.connect_scan = true-sU-nmap.udp_scan = true-sY-nmap.sctp_init_scan = true-sN-nmap.null_scan = true-sF-nmap.fin_scan = true-sX-nmap.xmas_scan = true-sA-nmap.ack_scan = true-sW-nmap.window_scan = true-sM-nmap.maimon_scan = true--scanflags-nmap.scan_flags = {syn: true, ack: true, rst: true}/nmap.scan_flags = [:syn, :ack, :rst]/nmap.scan_flags = 9/nmap.scan_flags = "SYNACKRST"-sZ-nmap.sctp_cookie_echo_scan = true-sI zombiehost:probeport-nmap.idle_scan = "zombiehost:probeport"-sO-nmap.ip_scan = true-b ftp.relay-host.com-nmap.ftp_bounce_scan = "ftp.relay-host.com"
Port Specification and Scan Order:
-p 22,80,443,8000-9000-nmap.ports = [22, 80, 443, 8000..9000]--exclude-ports 1-20,1024-2000-nmap.exclude_ports = [1..20, 1024..2000]-F-nmap.fast = true-r-nmap.consecutively = true--top-ports 10-nmap.top_ports = 10--port-ratio 0.5-nmap.port_ratio = 0.5
Service/Version Detection:
-sV-nmap.service_scan = true--allports-nmap.all_ports = true--version-intensity 9-nmap.version_intensity = 9--version-light-nmap.version_light = true--version-all-nmap.version_all = true--version-trace-nmap.version_trace = true-sR-nmap.rpc_scan = true
Script Scan:
-sC-nmap.default_script = true--script script1,script2,script3-nmap.script = ["script1", "script2", "script3"]--script-args=arg1=value,arg2=value2-nmap.script_args = {arg1:value1", arg2: "value2"}`--script-args-file path/to/file-nmap.script_args_file = "path/to/file"--script-help script1,script2,script3-nmap.script_help = ["script1", "script2", "script3"]--script-trace-nmap.script_trace = true--script-updatedb-nmap.update_scriptdb = treu
OS Detection:
-O-nmap.os_fingerprint = true--osscan-limit-nmap.limit_os_scan = true--osscan-guess-nmap.max_os_scan = true
Timing and Performance:
--min-hostgroup 42-nmap.min_host_group = 42--max-hostgroup 42-nmap.max_host_group = 42--min-parallelism 42-nmap.min_parallelism = 42--max-parallelism 42-nmap.max_parallelism = 42--min-rtt-timeout 100ms-nmap.min_rtt_timeout = "100ms"--max-rtt-timeout 500ms-nmap.max_rtt_timeout = "500ms"--initial-rtt-timeout 100ms-nmap.initial_rtt_timeout = "100ms"--max-retries 4-nmap.max_retries = 4--host-timeout 10s-nmap.host_timeout = "10s"--script-timeout 10s-nmap.script_timeout = "10s"--scan-delay 1s-nmap.scan_delay = "1s"--max-scan-delay 42s-nmap.max_scan_delay = "42s"--min-rate 10-nmap.min_rate = 10--max-rate 100-nmap.max_rate = 100--defeat-rst-ratelimit-nmap.defeat_rst_ratelimit = true--defeat-icmp-ratelimit-nmap.defeat_icmp_ratelimit = true--nsock-engine kqueue-nmap.nsock_engine = :kqueue-T polite-nmap.timing_template = :polite-T0-nmap.paranoid_timing = true-T1-nmap.sneaky_timing = true-T2-nmap.polite_timing = true-T3-nmap.normal_timing = true-T4-nmap.aggressive_timing = true-T5-nmap.insane_timing = true
Firewall/IDS Evasion and Spoofing:
-f-nmap.packet_fragments = true--mtu-nmap.mtu = true-D decoy1,decoy2-nmap.decoys = ["decoy1", "decoy2"]-S 8.8.8.8-nmap.spoof = "8.8.8.8"-e eth0-nmap.interface = "eth0"-g 1024-nmap.source_port = 1024--proxies proxy1,proxy2-nmap.proxies = ["proxy1", "proxy2"]--data AABBCCDDEEFF-nmap.data = "AABBCCDDEEFF"--data-string foobar-nmap.data_string = "foobar"--data-length 42-nmap.data_length = 42--ip-options T-nmap.ip_options = 'T'--ttl 42-nmap.ttl = 42--randomize-hosts-nmap.randomize_hosts = true--spoof-mac XX:XX:XX:XX:XX:XX-nmap.spoof_mac = "XX:XX:XX:XX:XX:XX"--badsum-nmap.bad_checksum = true--adler32-nmap.sctp_adler32 = true
Output:
-oN path/to/file-nmap.output_normal = "path/to/file"-oX path/to/file-nmap.output_xml = "path/to/file"-oS path/to/file-nmap.output_skiddie = "path/to/file"-oG path/to/file-nmap.output_grepable = "path/to/file"-oA path/to/basename-nmap.output_all = "path/to/basename"
Verbosity and Debugging:
-v-nmap.verbose = true-v3-nmap.verbose = 3-vv-nmap.extra_verbose = true-v0-nmap.quiet = true-d-nmap.debug = true-d9-nmap.debug = 9--reason-nmap.show_reason = true--stats-every 2s-nmap.stats_every = "2s"--packet-trace-nmap.show_packets = true--open-nmap.show_open_ports = true--iflist-nmap.show_interfaces = true--log-errors-nmap.show_log_errors = true
Miscellaneous Output:
--append-output-nmap.append_output = true--resume-nmap.resume = true--stylesheet path/to/stylesheet.xsl-nmap.stylesheet = "path/to/stylesheet.xsl"--webxml-nmap.webxml = true--no-stylesheet-nmap.no_stylesheet = true
Misc:
-6-nmap.ipv6 = true-A-nmap.all = true--datadir path/to/nmap/dir-nmap.nmap_datadir = "path/to/nmap/dir"--servicedb path/to/services.txt-nmap.servicedb = "path/to/services.txt"--versiondb path/to/versions.txt-nmap.versiondb = "path/to/versions.txt"--send-eth-nmap.send_eth = true--send-ip-nmap.send_ip = true--privileged-nmap.privileged = true--unprivileged-nmap.unprivileged = true--release-memory-nmap.release_memory = true--noninteractive-nmap.non_interactive = true-V-nmap.version = true-h-nmap.help = truegoogle.com 1.1.1.1 192.168.1-2.*-nmap.targets = ["google.com", "1.1.1.1", "192.168.1-2.*"]
Defined Under Namespace
Classes: HexString, Port, PortRange, PortRangeList, ScanFlags, Time
Constant Summary collapse
- ProtocolList =
This constant is part of a private API. You should avoid using this constant if possible, as it may be removed or be changed in the future.
Represents a list of protocols.
PortRangeList