1/24
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
-O
OS detection
-requires root privilege
-Sn , -sP
Ping scan/sweep
-sC
Enable default scripts for scanning
-T4
Aggressive scanning
-T2
Slows down the scan to avoid triggering security defenses
-v
Verbose mode, more detailed output
-6
IPV6
-sU
UDP scan
-Pn
Disable host discovery (ping scan)
-sS
SYN scan / stealthy scan
-sT
Full TCP connect scan
-sA
ACK scan
-sW
Window scan
-sF
FIN scan
-sX
Xmas scan
-sV
Service Version detection
-PR
ARP discovery
-sI
IDLE scan
-sL
DNS scan (List scan)
-sO
Protocol scan
-g
Specify source port for the scan
(Source port manipulation)
-f
Fragmentation
-D
decoy scan
A Decoy Scan (A) involves using multiple IP addresses to obscure the true source of the scan, which might not be effective against countermeasures targeting packet structures.
-PP
ICMP timestamp ping scan