Remote OS detection using TCP/IP
stack fingerprinting
-O
nmap 192.168.1.1 -O
If at least one open and one closed
TCP port are not found it will not try
OS detection against host
-O –osscan-limit
nmap 192.168.1.1 -O –osscan-limit
Makes Nmap guess more aggressively
-O –osscan-guess
nmap 192.168.1.1 -O –osscan-guess
Set the maximum number x of OS
detection tries against a target
-O –max-os-tries
nmap 192.168.1.1 -O –max-os-tries 1
Enables OS detection, version detection, script scanning, and traceroute
-A
nmap 192.168.1.1 -A