Skip to content
Back home
The home of William Rendell
  • Home
  • Family
    • Holidays
    • Pets
    • Vehicles
  • Health and Fitness
  • Technical
    • Mikrotik
    • Computing
    • Renewable Energy
  • Privacy Policy
    • Cookie policy (UK)
  • Music
    • Harmonica
      • Easy
      • Intermediate
  • Contact
  • Search
Back home
  • Search
  • Home
  • Family
    • Holidays
    • Pets
    • Vehicles
  • Health and Fitness
  • Technical
    • Mikrotik
    • Computing
    • Renewable Energy
  • Privacy Policy
    • Cookie policy (UK)
  • Music
    • Harmonica
      • Easy
      • Intermediate
  • Contact
Home » Technical » Computing » nmap quick guide
Computing Technical

nmap quick guide

by William Rendell|Published January 17, 2022

nmap -sT targetIP/hostname

nmap –script vuln targetIP/hostname

-O trys to identify Operating System, example nmap -sT -O targetIP/hostnam

  • Linux
  • nmap
  • scan
  • security

You may also like

Paypal Twitter account hacked
Published July 5, 2011

Paypal Twitter account hacked

A disgruntled customer has hacked in to the Twitter account of Paypal UK this evening. The Twitter account has now been suspended […]

Published January 28, 2021

Remove active PPP connection (L2TP, PPTP etc) on Mikrotik using a script

If you ever have the need to only allow PPP connection(s) (L2TP, PPTP etc) for a certain time period, you can use […]

Published May 8, 2018

Exporting Mikrotik Firewall Rules

In a terminal windows or via ssh, enter the below line ip firewall export file=firewallrules then find a file called “firewallrules.rsc” in […]

Remove IP from Fail2Ban Intrusion Detector
Published January 22, 2020

Remove IP from Fail2Ban Intrusion Detector

fail2ban-client set JAILNAMEHERE unbanip IPADDRESSHERE

Post navigation

  • Previous post Remote Failover testing
  • Back to post list
  • Next post WiFi

© 2026  – All rights reserved

Powered by WP – Designed with the Customizr Theme