TCP Scanning with Netcat
Switches:
-n: numeric addresses only
-vv: very verbose
-w: timeout in seconds
-z: zero-I/O mode [used for scanning]
UDP Scanning with Netcat
Switches:
-u: udp mode
Traffic Accountability with iptables
Switches:
-I: insertion - Using a rule with the insertion option will add it to the beginning of a chain and will be applied first. To indicate a specific placement in the chain, you may also use a number with the -I option
-s: source - indicates the source for said packet filtering
-j: jump - what action will be performed if the packet is a match
-d: destination - specifies the destination address
-Z: zero - zeroes counters in all chains
-F: flush - flush all rules
Viewing the Output
Switches:
-u: verbose output
-n: numeric addresses only
-L: list the rules in a chain or all chains
Greppable Output
Switches:
-oG: - output greppable format followed by output file
Scan range for single open port
Switches:
-p: specify port (or range)
Scan range for only common ports
Switches:
-A: enable OS detection, version detection, script scanning and traceroute
--top-ports=20: scan only the 20 of the top [or common] ports
OS FingerPrinting
Switches:
-O: OS detection
Banner Grabbing/Service Enumeration
Switches:
-sT: TCP Scan
-sV: probe open ports to determine service/version info
Using NSE Scripts
Switches:
-p: Port range
--script: Name of script
SCRIPT DEFAULT STORAGE LOCATION: /usr/share/nmap/scripts
General Recon [Start Recon]
Switches:
-sC: default scripts
-sV: service version
-oA: output all formats + file name