Nmap Flags Flashcards

(25 cards)

1
Q

Flag

A

Description

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

-sn

A

Host discovery scan (ping sweep). Skips port scan, just checks which hosts are alive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

-sL

A

List scan. Lists targets and resolves hostnames without sending packets to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

-PS <port></port>

A

TCP SYN ping. Sends SYN packets to check if a port responds, indicating host is up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

-PA <port></port>

A

TCP ACK ping. Sends ACK packets to check if ports respond, useful to bypass some filters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

-PU <port></port>

A

UDP ping. Sends UDP packets to detect active hosts on specific ports like DNS or SNMP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

-sY

A

SCTP INIT ping. Uses Stream Control Transmission Protocol to probe hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

-Pn

A

Treat all hosts as up. Skips host discovery stage, useful when ICMP is blocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

-sS

A

TCP SYN (half-open) scan. Sends SYN packets without completing handshake; stealthier than full connect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

-sT

A

TCP connect scan. Completes full 3-way handshake; easier to detect but works without raw socket access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

-sN

A

Null scan. Sends packets with no flags set; relies on RFC behavior for closed ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

-sF

A

FIN scan. Sends FIN flag only; some systems reveal closed ports by responding with RST.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

-sX

A

Xmas scan. Sends FIN+PSH+URG flags; closed ports respond with RST, open ports ignore.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

-sU

A

UDP scan. Sends UDP packets to detect open/closed ports; slower, prone to false negatives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

-sI

A

Idle (zombie) scan. Uses a third-party idle host to scan target, hiding tester’s IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

-p

A

Port specification. Allows scanning specific ports or ranges (e.g., -p 80,443 or -p 1-1000).

17
Q

-f / –mtu

A

Fragment packets into smaller pieces to evade firewalls/IDS; may bypass simple filtering rules.

18
Q

–scan-delay <time></time>

A

Adds delay between probes; reduces detection by IDS but makes scan slower.

19
Q

-T<0–5>

A

Timing template. Controls speed/aggressiveness (0=paranoid for stealth, 5=insane/fast for speed).

20
Q

-sV

A

Version detection. Probes services to determine exact software and version running.

21
Q

-A

A

Aggressive scan. Enables OS detection, version detection, NSE scripts, and traceroute in one command.

22
Q

-O

A

OS detection. Attempts to identify the target’s operating system from TCP/IP fingerprinting.

23
Q

-oN

A

Normal output. Saves scan results in human-readable text format.

24
Q

-oX

A

XML output. Saves scan results in XML format for parsing or reporting.

25
-oG
Grepable output. Saves scan results in a simplified format for easy search/grep usage.