Scan Types
SYN Scan
Fast, stealthy scan
TCP Connect
Full TCP connection
ACK Scan
ACK flag probe scan
FIN Scan
FIN flag set only
XMAS Scan
FIN, PSH, URG flags
Maimon Scan
FIN/ACK probe
Zombie scan
Abuse third-party hosts.
IP Protocol
IP protocol scan
Port Selection
All Ports
Scan all 65535 ports
Top 1000
Most common ports
Common Services
SSH,HTTP,HTTPS,RDP
Extended Common
More services
Mixed TCP/UDP
Common for both
Fast Scan
100 most common
Exclude ports
Exclude scanning certain ports.
Host Discovery
No Ping
Skip host discovery
ARP Scan
Local network only
TCP SYN Ping
To common ports
TCP ACK Ping
May bypass firewalls
ICMP Timestamp
Timestamp request
ICMP Netmask
Address mask request
Timing & Performance
Paranoid
Very slow, stealthy
Insane
Fastest, inaccurate
Custom Timing
Minimum packet rate
Increase the packets/sec that get sent.
Maximum packet rate
Limit the packets/sec that get sent.
Increase hostgroups
increase the minimum amount of concurrent hosts scanned.
Limit hostgroups
Limit the amount of concurrent hosts scanned.
Minimum parallelism
Speed up scanning (min limit)
Maximum parallelism
Speed up scanning (max limit)
Host timeout
set a timeout for hosts that don't respond
Output Format
Normal Output
Human readable
Grepable Output
Easy to parse
XML Output
Structured data
All Formats
Save in all formats
Very Verbose
Even more info
Show Reason
Port state reasons
Open Ports Only
Skip closed ports
Service Detection
Version Detection
Identify services
Light Version
Fast service detection
Aggressive Version
Thorough but slow
All Version Tests
Try every probe
Trace Version
Show detection details
All Ports
Don't exclude any ports
OS Detection
OS Detection
Identify operating system
Aggressive OS
Guess OS aggressively
Limit OS Scan
Only promising targets
Aggressive Scan
OS, version, scripts
Script Scanning
Default Scripts
Safe scripts
Default Scripts
Equivalent to -sC
Vulnerability Scan
Find vulnerabilities
Safe Scripts
Non-intrusive only
Auth Scripts
Authentication checks
Discovery
Network discovery
Version Scripts
Better service detection
Exploit Scripts
Attempt exploitation
SSL Ciphers
Check SSL/TLS
HTTP Enum
Enumerate web files
SMB OS Discovery
Windows system info
Banner Grabbing
Get service banners
Advanced Options
Privileged
Assume root/admin
Send Ethernet
Use raw ethernet
Data length
Add random data
Bad Checksum
Send invalid checksums
Traceroute
Trace path to host
System DNS
Use system resolver
Firewall/IDS Evasion
Fragment Packets
Split IP packets
Custom MTU
Fragment at given size
Spoof Source IP
Fake source address
Spoof MAC
Fake MAC address
Use Proxy
HTTP/SOCKS4 proxy
Decoy Scan
Hide among decoys
Source Port
Appear as specific traffic
Random Order
Shuffle target order