Logo
    Akhil Abraham
    Akhil Abraham
    📕

    [Stealth] Nmap Cheat Sheet

    Tags
    ReconResource DevelopmentInitial Access
    image

    Here is a quick cheat sheet for security testing with nmap:

    Stealth is a key element of penetration testing and network scanning activities, as being stealthy allows for more accurate results and a reduced chance of detection. Nmap provides several features and scanning methods for this purpose:

    1. Stealth SYN scan - This type of scan sends a SYN packet, as if it is initiating a TCP connection, but then drops the connection once the target host responds:
    2. nmap -sS <TARGET-IP>
    3. Fragment packets - This option breaks down the created packets into tiny fragments to sneak past certain firewalls and packet filters:
    4. nmap -f <TARGET-IP>
    5. FIN scan - This type of scan can bypass certain firewalls by sending a packet with the FIN bit set:
    6. nmap -sF <TARGET-IP>
    7. Xmas scan - This sends packets with the FIN, URG, and PUSH flags set. Some systems' responses to these unusual flags can reveal useful information:
    8. nmap -sX <TARGET-IP>
    9. Null scan - This is similar to Xmas scan but it sends a packet with no flags set:
    10. nmap -sN <TARGET-IP>
    11. Idle scan - This type of scan allows for scanning via a "zombie" device, which hides the scanner's IP:
    12. nmap -sI <Zombie-IP> <TARGET-IP>

      This will initiate an Idle Scan using zombie_IP as the "zombie" against the target_IP.

      Remember, Idle scanning is an advanced technique, and it may not work against all systems. Additionally, it could potentially cause disruption to the "zombie" host.

    13. Specify a decoy - This option makes it appear to the remote host that the host(s) you specify as decoys are scanning the target network too:
    14. nmap -D RND:10 [target] (Randomly selects 10 hosts to act as decoys)
      nmap -D decoy1,decoy2,decoy3 etc. (Manually specify the decoys)
    15. Timing options - These options can slow down the scan to make it harder to detect:
    16. #(T2 is slower but stealthier. T0 is slowest, T5 is fastest)
      nmap -T2 <TARGET-IP>
    17. Putting it all together
    18. nmap -sS -T2 -f -p- <TARGET-IP>
      icon

      Medium Post:

      Stealthy Cheat sheet for Nmap

      Here is a quick cheat sheet for security testing with nmap:

      medium.com

      Stealthy Cheat sheet for Nmap
    Logo

    ©️ 2020-2026, Akhil Abraham.

    LinkedInGitHubMediumX