Forrest logo
back to the nmap tool

nmap:tldr:0cec2

nmap: Perform service and version detection of the top 1000 ports using default NSE scripts; writing results ('-oN') to output file.
$ nmap -sC -sV -oN ${top-1000-ports-txt} ${address_or_addresses}
try on your machine

The given command is utilizing the nmap tool with various options to perform network scanning and advanced enumeration techniques. Let's break down the command step by step:

  • nmap: This is the command itself, which is used to run the nmap tool.

  • -sC: This option enables the default set of scripts to be run against the target hosts. These scripts help in performing different tasks like version detection, vulnerability scanning, and more.

  • -sV: This option is used to enable version detection while scanning. It tries to determine the versions of services running on the target ports.

  • -oN ${top-1000-ports-txt}: This option specifies the output file format and filename. In this case, it is set to ${top-1000-ports-txt}, which indicates that the output should be saved in a file named top-1000-ports.txt.

  • ${address_or_addresses}: This parameter represents the target host or hosts to be scanned. It can be an IP address, hostname, or a range of addresses. Multiple targets can be specified by separating them with spaces.

Overall, the command executes an nmap scan with default scripts applied, version detection enabled, and saves the results to a file named top-1000-ports.txt. The scanned target(s) can be specified after the command.

This explanation was created by an AI. In most cases those are correct. But please always be careful and never run a command you are not sure if it is safe.
back to the nmap tool