From the course: Security Testing: Nmap Security Scanning
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Scanning shortcut - Nmap Tutorial
From the course: Security Testing: Nmap Security Scanning
Scanning shortcut
- [Instructor] There are many different command line options that we can provide to set up an Nmap scan. You can mix and match options to create a highly customized scan, but there's also a shortcut available to activate many of the most popular options at the same time. Nmap's -A flag turns on several testing options that provide detail about the target system and its network location. The A flag enables remote operating system detection, activates service and version detection, and requests a trace route to the target. It also activates the Nmap scripting engine that allows customized testing of the target system with user defined, or community developed test scripts. Let's take a look at the -A flag in action. I'm going to run a scan against the scanmetanmap.org server. And I'm going to do that with both the -A flag and the T4 timing template. Now, we're already running that with root privileges here, and we need to do…