Catalog / Network Scanning Tools Cheatsheet
Network Scanning Tools Cheatsheet
A comprehensive guide to network scanning tools, their functionalities, and common usage scenarios. This cheat sheet covers essential commands, options, and techniques for network reconnaissance and security auditing.
Nmap Basics
Nmap Scan Types
|
Establishes a full TCP connection. Requires no special privileges. |
|
Half-open scan; sends SYN packets, less likely to be logged. Requires root privileges. |
|
Sends UDP packets to the target. Can be slow and unreliable due to UDP’s nature. |
|
Sends a FIN packet. Stealthier than SYN scan, but may not work on all systems. |
|
Sends a FIN, PSH, and URG packet. Similar to FIN scan in stealth. |
|
Sends a packet with no flags set. Stealthiest, but least reliable. |
Target Specification
|
|
|
|
|
|
Common Nmap Options
|
Verbose mode; increases the level of detail. |
|
Aggressive scan; enables OS detection, version detection, script scanning, and traceroute. |
|
Timing template; sets the scan speed (0 is slowest, 5 is fastest). |
|
Specifies the ports to scan (e.g., |
|
Enables OS detection. |
|
Runs NSE scripts for advanced scanning. Example: |
Nmap Advanced Techniques
Version Detection
|
|
|
|
|
OS Detection
|
Enables OS detection to attempt to identify the operating system of the target. |
|
Limits OS detection to promising targets. Use when you know at least one open and one closed TCP port. |
|
Guesses the OS more aggressively. |
|
Shows detailed OS detection activity. |
NSE Scripting
|
|
|
|
|
|
|
Masscan Techniques
Basic Usage
|
Example: |
|
|
|
Rate Limiting
|
Sets the packet transmission rate in packets per second (pps). |
Example |
|
Note |
A higher rate can lead to faster scans but may also cause network congestion or be blocked by firewalls. |
Excluding Targets
|
Example |
Create a file named |
Add IP addresses. |
|
Saving Output
|
Saves the output in XML format. |
|
Saves the output in Grepable format. |
|
Saves the output in JSON format. |
|
Saves the output in list format. |
Netdiscover Usage
Interface Selection
|
Example: |
If no interface is specified, Netdiscover attempts to auto-detect one. |
Range Specification
|
Defines the IP range to scan. Use CIDR notation for subnets. |
Example |
|
Note |
If no range is specified, Netdiscover scans the entire subnet of the selected interface. |
Passive Mode
|
In passive mode, Netdiscover relies on network traffic to discover hosts. |
Useful in environments where active scanning is not desired or allowed. |
Saving and Loading Results
|
Saves the discovered hosts to a file. |
|
Loads a list of known hosts from a file to avoid re-scanning. |
Example |
|