Nmap detects the target host port open status
- nmap 192.168.73.139 (host port scan)
- nmap -p 80 192.168.73.139 (host port 80 scan)
- nmap -p 80,443 192.168.73.139 (scanning ports 80 and 443)
- nmap -p 80-443 192.168.73.139 (scan port 80-443)
- nmap -p 1-65535 192.168.73.139 (full port scan)
- nmap -sU -p U:445 192.168.73.139 (scan the Udp protocol of 445)
- nmap -sT -p T:445 192.168.73.139 (scan the tcp protocol of 445)
- nmap -sS -p T:445,U:135 192.168.73.139 (multi-protocol scan)
- nmap –top-ports 10 192.168.73.139 (scanning the 10 most commonly used ports)
- nmap –port-ratio 0 192.168.73.139 (use port scan with low probability)
nmap 192.168.73.139 (host port scan)
└─# nmap 192.168.73.139 Starting Nmap 7.92 ( https://nmap.org ) at 2023-11-04 08:19 EDT Nmap scan report for 192.168.73.139 Host is up (0.0016s latency). Not shown: 977 closed tcp ports (reset) PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 23/tcp open telnet 25/tcp open smtp 53/tcp open domain 80/tcp open http 111/tcp open rpcbind 139/tcp open netbios-ssn 445/tcp open microsoft-ds 512/tcpopenexec 513/tcp open login 514/tcp open shell 1099/tcp open rmiregistry 1524/tcp open ingreslock 2049/tcp open nfs 2121/tcp open ccproxy-ftp 3306/tcp open mysql 5432/tcp open postgresql 5900/tcp open vnc 6000/tcp openX11 6667/tcp openirc 8009/tcpopenajp13 8180/tcp open unknown MAC Address: 00:0C:29:4F:35:A4 (VMware) Nmap done: 1 IP address (1 host up) scanned in 0.42 seconds
nmap -p 80 192.168.73.139 (host port 80 scan)
Specify port 80 for scanning
┌──(root?kali)-[~] └─# nmap -p 80 192.168.73.139 Starting Nmap 7.92 ( https://nmap.org ) at 2023-11-04 08:20 EDT Nmap scan report for 192.168.73.139 Host is up (0.00028s latency). PORT STATE SERVICE 80/tcp open http MAC Address: 00:0C:29:4F:35:A4 (VMware) Nmap done: 1 IP address (1 host up) scanned in 0.30 seconds
nmap -p 80,443 192.168.73.139 (scan port 80, 443)
┌──(root?kali)-[~] └─# nmap -p 80,443 192.168.73.139 Starting Nmap 7.92 ( https://nmap.org ) at 2023-11-04 08:20 EDT Nmap scan report for 192.168.73.139 Host is up (0.00057s latency). PORT STATE SERVICE 80/tcp open http 443/tcp closed https MAC Address: 00:0C:29:4F:35:A4 (VMware) Nmap done: 1 IP address (1 host up) scanned in 8.29 seconds
nmap -p 80-443 192.168.73.139 (scan port 80-443)
└─# nmap -p 80-443 192.168.73.139 Starting Nmap 7.92 ( https://nmap.org ) at 2023-11-04 08:21 EDT Nmap scan report for 192.168.73.139 Host is up (0.0023s latency). Not shown: 361 closed tcp ports (reset) PORT STATE SERVICE 80/tcp open http 111/tcp open rpcbind 139/tcp open netbios-ssn MAC Address: 00:0C:29:4F:35:A4 (VMware) Nmap done: 1 IP address (1 host up) scanned in 0.32 seconds
nmap -p 1-65535 192.168.73.139 (full port scan)
└─# nmap -p 1-65535 192.168.73.139 Starting Nmap 7.92 ( https://nmap.org ) at 2023-11-04 08:22 EDT Nmap scan report for 192.168.73.139 Host is up (0.0028s latency). Not shown: 65505 closed tcp ports (reset) PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 23/tcp open telnet 25/tcp open smtp 53/tcp open domain 80/tcp open http 111/tcp open rpcbind 139/tcp open netbios-ssn 445/tcp open microsoft-ds 512/tcpopenexec 513/tcp open login 514/tcp open shell 1099/tcp open rmiregistry 1524/tcp open ingreslock 2049/tcp open nfs 2121/tcp open ccproxy-ftp 3306/tcp open mysql 3632/tcp open distccd 5432/tcp open postgresql 5900/tcp open vnc 6000/tcp openX11 6667/tcp openirc 6697/tcp openircs-u 8009/tcpopenajp13 8180/tcp open unknown 8787/tcp open msgsrvr 44342/tcp open unknown 46882/tcp open unknown 55382/tcp open unknown 57276/tcp open unknown MAC Address: 00:0C:29:4F:35:A4 (VMware) Nmap done: 1 IP address (1 host up) scanned in 7.16 seconds
nmap -sU -p U:445 192.168.73.139 (Scan the Udp protocol of 445)
└─# nmap -sU -p U:445 192.168.73.139 Starting Nmap 7.92 ( https://nmap.org ) at 2023-11-04 08:27 EDT Nmap scan report for 192.168.73.139 Host is up (0.00035s latency). PORT STATE SERVICE 445/udp open|filtered microsoft-ds MAC Address: 00:0C:29:4F:35:A4 (VMware) Nmap done: 1 IP address (1 host up) scanned in 13.41 seconds
nmap -sT -p T:445 192.168.73.139 (scan the tcp protocol of 445)
└─# nmap -sT -p T:445 192.168.73.139 Starting Nmap 7.92 ( https://nmap.org ) at 2023-11-04 08:28 EDT Nmap scan report for 192.168.73.139 Host is up (0.00047s latency). PORT STATE SERVICE 445/tcp open microsoft-ds MAC Address: 00:0C:29:4F:35:A4 (VMware) Nmap done: 1 IP address (1 host up) scanned in 13.12 seconds
nmap -sS -p T:445,U:135 192.168.73.139 (multi-protocol scan)
└─# nmap -sS -p T:445,U:135 192.168.73.139 Starting Nmap 7.92 ( https://nmap.org ) at 2023-11-04 08:28 EDT WARNING: Your ports include "U:" but you haven't specified UDP scan with -sU. Nmap scan report for 192.168.73.139 Host is up (0.00031s latency). PORT STATE SERVICE 445/tcp open microsoft-ds MAC Address: 00:0C:29:4F:35:A4 (VMware) Nmap done: 1 IP address (1 host up) scanned in 13.19 seconds
nmap –top-ports 10 192.168.73.139 (scanning the 10 most commonly used ports)
└─# nmap --top-ports 10 192.168.73.139 Starting Nmap 7.92 ( https://nmap.org ) at 2023-11-04 08:31 EDT Nmap scan report for 192.168.73.139 Host is up (0.00027s latency). PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 23/tcp open telnet 25/tcp open smtp 80/tcp open http 110/tcp closed pop3 139/tcp open netbios-ssn 443/tcp closedhttps 445/tcp open microsoft-ds 3389/tcp closed ms-wbt-server MAC Address: 00:0C:29:4F:35:A4 (VMware) Nmap done: 1 IP address (1 host up) scanned in 13.22 seconds
nmap –port-ratio 0 192.168.73.139 (port scan with low probability of use)
Probability range 0-1 0.2 means 20%
└─# nmap --port-ratio 0 192.168.73.139 Starting Nmap 7.92 ( https://nmap.org ) at 2023-11-04 08:33 EDT Nmap scan report for 192.168.73.139 Host is up (0.0035s latency). Not shown: 8324 closed tcp ports (reset) PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 23/tcp open telnet 25/tcp open smtp 53/tcp open domain 80/tcp open http 111/tcp open rpcbind 139/tcp open netbios-ssn 445/tcp open microsoft-ds 512/tcpopenexec 513/tcp open login 514/tcp open shell 1099/tcp open rmiregistry 1524/tcp open ingreslock 2049/tcp open nfs 2121/tcp open ccproxy-ftp 3306/tcp open mysql 3632/tcp open distccd 5432/tcp open postgresql 5900/tcp open vnc 6000/tcp openX11 6667/tcp openirc 6697/tcp openircs-u 8009/tcpopenajp13 8180/tcp open unknown 8787/tcp open msgsrvr 55382/tcp open unknown MAC Address: 00:0C:29:4F:35:A4 (VMware) Nmap done: 1 IP address (1 host up) scanned in 14.02 seconds