--max-retries Caps number of
port scan probe retransmissions.
--host-timeout
--scan-delay/--max-scan-delay
FIREWALL/IDS EVASION AND SPOOFING:
-f; --mtu fragment packets
(optionally w/given MTU)
-D Cloak a scan
with decoys
-S Spoof source
address
-e Use specified interface
-g/--source-port Use given
port number
--data-length Append random data
to sent packets
--ttl Set IP time-to-live
field
--spoof-mac Spoof your MAC address
--badsum Send packets with a bogus TCP/UDP
checksum
OUTPUT:
-oN/-oX/-oS/-oG Output scan in
normal, XML, s|
-oA Output in the three
major formats at once
-v Increase verbosity level (use twice for
more effect)
-d[level] Set or increase debugging level (Up
to 9 is meaningful)
--packet-trace Show all packets sent and
received
--iflist Print host interfaces and routes
(for debugging)
--log-errors Log errors/warnings to the
normal-format output file
--append-output Append to rather than clobber
specified output files
--resume Resume an aborted
scan
--stylesheet XSL stylesheet
to transform XML output to HTML
--webxml Reference stylesheet from
Insecure.Org for more portable XML
--no-stylesheet Prevent associating of XSL
stylesheet w/XML output
MISC:
-6 Enable IPv6 scanning
-A Enables OS detection and Version
detection
--datadir Specify custom Nmap
data file location
--send-eth/--send-ip Send using raw ethernet
frames or IP packets
--privileged Assume that the user is fully
privileged
-V Print version number
Examples
nmap -P0 204.228.150.3
Running the above port scan on the Computer
Hope IP address would give information similar to the below
example. Keep in mind that with the above command it's
-P not the letter O.
Interesting ports on www.computerhope.com
(204.228.150.3):