This Scripting for google anayltics

Ping Sweeps, Port Scans, IP Spoofing and Gathering Information - NMAP

NMAP is a penetration testing and network information gathering tool which was use by most of the IT administrators around the world. NMAP uses are more wide and we can easily gather the devices and the Network peripherals around you.

To see which NMAP version you are using, you need to use the following command in the Kali Linux terminal. It is very important because, whenever a new NMAP version was released, you will get some new feature which comes with your NMAP Package. So next time while you are starting to use the NMAP app in Kali Linux, check whether you are using the latest version of NMAP.


before this article,we recommend to you must read our


Metasploit Tutorials From Basic to Advance


It assumes that you already have MetaSploit installed, or that you are running Kali / backtrack Linux. if not Installed,you can download from here https://www.metasploit.com/


Lets Start with NMAP - Ping Sweeps, Port Scans, IP Spoofing


Open Terminal and Type nmap for help information.

It is the worlds leading port scanner, and a popular part of our hosted security tools. Nmap as an online port scanner is able to scan your perimeter network devices and servers from an external perspective; ie outside your firewall.


Ping Sweeps, Port Scans, IP Spoofing and Gathering Information - NMAP


It is the worlds leading port scanner, and a popular part of our hosted security tools. Nmap as an online port scanner is able to scan your perimeter network devices and servers from an external perspective; ie outside your firewall.


nmap 192.168.18.129 [Target or any I.P Address]

Here i am using my target window I.P Address.

Ping Sweeps, Port Scans, IP Spoofing and Gathering Information - NMAP


TCP connect port scan(Default without root privilege)

This command is similar to the TCP SYN scan however rather than sending a SYN packet and reviewing the headers it will ask the OS to establish a TCP connection to the 1000 common ports.

nmap -sT 192.168.18.129

Ping Sweeps, Port Scans, IP Spoofing and Gathering Information - NMAP


UDP port scan

nmap -sU 192.168.18.129

Ping Sweeps, Port Scans, IP Spoofing and Gathering Information - NMAP


Attempts to determine the version of the service running on port


nmap -sV 192.168.18.129

Ping Sweeps, Port Scans, IP Spoofing and Gathering Information - NMAP


Remote OS detection using TCP/IP stack fingerprinting

With the -O option nmap will try to guess the targets operating system. This is accomplished by utilizing information that nmap is already getting through the TCP SYN port scan. This is usually a best guess but can actually be fairly accurate. The operating system scan however does require root privileges.


nmap -O 192.168.18.129

Ping Sweeps, Port Scans, IP Spoofing and Gathering Information - NMAP


Enables OS detection, version detection, script scanning, and traceroute

nmap -A 192.168.18.129

Ping Sweeps, Port Scans, IP Spoofing and Gathering Information - NMAP


Fast port scan (100 ports)


nmap -F 192.168.18.129

Ping Sweeps, Port Scans, IP Spoofing and Gathering Information - NMAP


Port scan for Particluar port scan (Port x)

nmap -p 443 192.168.18.129

Ping Sweeps, Port Scans, IP Spoofing and Gathering Information - NMAP


Port scan multiple ports


nmap -p 443,80 192.168.18.129

Ping Sweeps, Port Scans, IP Spoofing and Gathering Information - NMAP


Port range scan

nmap -p 1-500 192.168.18.129

Ping Sweeps, Port Scans, IP Spoofing and Gathering Information - NMAP


Fast port scan (100 ports) for multiple I.P address

nmap -F 192.168.18.129 192.168.18.132

Ping Sweeps, Port Scans, IP Spoofing and Gathering Information - NMAP


Port scan between I.P address range.

nmap -p 1-500 192.168.18.129-132

Ping Sweeps, Port Scans, IP Spoofing and Gathering Information - NMAP


Disable host discovery. Port scan only.

nmap -pn 192.168.18.129

Ping Sweeps, Port Scans, IP Spoofing and Gathering Information - NMAP


Requested scan (including ping scans) use tiny fragmented IP packets. Harder for packet filters.

nmap -f 192.168.18.129

Ping Sweeps, Port Scans, IP Spoofing and Gathering Information - NMAP


When this command runs nmap tries to ping the given IP address range to check if the hosts are alive. If ping fails it tries to send syn packets to port 80 (SYN scan). This is not hundred percent reliable because modern host based firewalls block ping and port 80. Windows firewall blocks ping by default. The hosts you have on the network are blocking ping and the port 80 is not accepting connections. Hence nmap assumes that the host is not up.


nmap -sP 192.168.18.129-132

Ping Sweeps, Port Scans, IP Spoofing and Gathering Information - NMAP


For References :-




I hope you enjoyed this article.


Who Should Read TechTrick?

All the tricks and tips that TechTrick provides only for educational purpose. If you choose to use the information in TechTrick to break into computer systems maliciously and without authorization, you are on your own. Neither I (TechTrick Admin) nor anyone else associated with TechTrick shall be liable. We are not responsibe for any issues that caused due to informations provided here. So, Try yourself and see the results. You are not losing anything by trying... We are humans, Mistakes are quite natural. Here on TechTrick also have many mistakes..