grep -i "description" /usr/share/nmap/scripts/ftp-*.nse

2025-05-13_09-17.png

--packet-trace --disable-arp-ping

--reason

--initial-rtt-timeout [XX]ms --max-rtt-timeout [XX]ms

--max-retries []

--min-rate 300

-T

rustscan -a [t1] --utimit 5000 -b 2000

nmap -sn -PA [IP/24] (Host discovery if some hosts may seem down but sure they up)


nmap -p- --open -sS -min-rate 5000 -n -vvv -Pn <ip>


full_nmap: nmap -p- -sS -T4 -Pn -n -oA full_scan [] ⇒ grep ^[0-9] full_scan.nmap | cut -d '/' -f1 | paste -sd, - ⇒ nmap -sC -sV -p <ports> -T4 -oA detailed_scan []


nmap -sC -sV -p <ports> -oA detailed_scan (When I’m really curious about a specific port)


sudo nmap -sU -p53,67,123,137,138,139,161 -T4 (UDP)