Skip to content
This repository was archived by the owner on Feb 26, 2021. It is now read-only.

Commit 90cf416

Browse files
authored
Add missing information about nmap params
1 parent 551c5a5 commit 90cf416

1 file changed

Lines changed: 13 additions & 0 deletions

File tree

README.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,19 @@ The nmap scan target is set via the targets location of the securityTest. The ta
2222

2323
Additional nmap scan features can be configured via the `NMAP_PARAMTER` attribute. For a detailed explanation to which parameters are availible refer to the [Nmap Reference Guide](https://nmap.org/book/man.html).
2424

25+
Some usefull example parameters listed below:
26+
27+
* `-p` xx: Scan ports of the target. Replace xx with a single port number or
28+
a range of ports.
29+
* `-PS`, `-PA`, `-PU` xx: Replace xx with the ports to scan. TCP SYN/ACK or
30+
UDP discovery.
31+
* `-sV`: Determine service and version info.
32+
* `-O`: Determine OS info. **Note:** This requires the the user to be run as root or the system capabilities to be extended to allow nmap to send raw sockets. See more information on [how to deploy the secureCodeBox nmap container to allow this](https://github.com/secureCodeBox/scanner-infrastructure-nmap/pull/20) and the [nmap docs about priviliged scans](https://secwiki.org/w/Running_nmap_as_an_unprivileged_user)
33+
* `-A`: Determine service/version and OS info.
34+
* `-script` xx: Replace xx with the script name. Start the scan with the given script.
35+
* `--script` xx: Replace xx with a coma-separated list of scripts. Start the scan with the given scripts.
36+
37+
2538
## Example
2639

2740
Example configuration:

0 commit comments

Comments
 (0)