You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Feb 26, 2021. It is now read-only.
Copy file name to clipboardExpand all lines: README.md
+13Lines changed: 13 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,6 +22,19 @@ The nmap scan target is set via the targets location of the securityTest. The ta
22
22
23
23
Additional nmap scan features can be configured via the `NMAP_PARAMTER` attribute. For a detailed explanation to which parameters are availible refer to the [Nmap Reference Guide](https://nmap.org/book/man.html).
24
24
25
+
Some usefull example parameters listed below:
26
+
27
+
*`-p` xx: Scan ports of the target. Replace xx with a single port number or
28
+
a range of ports.
29
+
*`-PS`, `-PA`, `-PU` xx: Replace xx with the ports to scan. TCP SYN/ACK or
30
+
UDP discovery.
31
+
*`-sV`: Determine service and version info.
32
+
*`-O`: Determine OS info. **Note:** This requires the the user to be run as root or the system capabilities to be extended to allow nmap to send raw sockets. See more information on [how to deploy the secureCodeBox nmap container to allow this](https://github.com/secureCodeBox/scanner-infrastructure-nmap/pull/20) and the [nmap docs about priviliged scans](https://secwiki.org/w/Running_nmap_as_an_unprivileged_user)
33
+
*`-A`: Determine service/version and OS info.
34
+
*`-script` xx: Replace xx with the script name. Start the scan with the given script.
35
+
*`--script` xx: Replace xx with a coma-separated list of scripts. Start the scan with the given scripts.
0 commit comments