Skip to content
Back home
The home of William Rendell
  • Home
  • Family
    • Holidays
    • Pets
    • Vehicles
  • Health and Fitness
  • Technical
    • Mikrotik
    • Computing
    • Renewable Energy
  • Privacy Policy
    • Cookie policy (UK)
  • Music
    • Harmonica
      • Easy
      • Intermediate
  • Contact
  • Search
Back home
  • Search
  • Home
  • Family
    • Holidays
    • Pets
    • Vehicles
  • Health and Fitness
  • Technical
    • Mikrotik
    • Computing
    • Renewable Energy
  • Privacy Policy
    • Cookie policy (UK)
  • Music
    • Harmonica
      • Easy
      • Intermediate
  • Contact
Home » Technical » Computing » nmap quick guide
Computing Technical

nmap quick guide

by William Rendell|Published January 17, 2022

nmap -sT targetIP/hostname

nmap –script vuln targetIP/hostname

-O trys to identify Operating System, example nmap -sT -O targetIP/hostnam

  • Linux
  • nmap
  • scan
  • security

You may also like

Ex2010 – Ex2003
Published May 3, 2012

Ex2010 – Ex2003

During as SBS2003 migration to SBS2011, while decommissioning the source server (SBS2003) before Exchange 2003 can be removed you will have to remove the […]

Evenit ID 210
Published April 29, 2012

Evenit ID 210

You can increase the message size limit but I would strongly suggest you make sure you have the horsepower to do this […]

Published June 18, 2020

SSH from one Mikrotik to another

OverviewRouterOS provides SSH client that supports SSHv2 logins to SSH servers reachable from the router. RequirementsFor this command to be available router […]

What version of Centos is my server running?
Published February 3, 2015

What version of Centos is my server running?

This post shows how to find out what version of Centos you are running from the command line. tail /etc/redhat-release This will […]

Post navigation

  • Previous post Remote Failover testing
  • Back to post list
  • Next post WiFi

© 2025  – All rights reserved

Powered by WP – Designed with the Customizr Theme