Skip to content
Back home
The home of William Rendell
  • Home
  • Family
    • Holidays
    • Pets
    • Vehicles
  • Health and Fitness
  • Technical
    • Mikrotik
    • Computing
    • Renewable Energy
  • Privacy Policy
    • Cookie policy (UK)
  • Music
    • Harmonica
      • Easy
      • Intermediate
  • Contact
  • Search
Back home
  • Search
  • Home
  • Family
    • Holidays
    • Pets
    • Vehicles
  • Health and Fitness
  • Technical
    • Mikrotik
    • Computing
    • Renewable Energy
  • Privacy Policy
    • Cookie policy (UK)
  • Music
    • Harmonica
      • Easy
      • Intermediate
  • Contact
Home » Technical » Computing » nmap quick guide
Computing Technical

nmap quick guide

by William Rendell|Published January 17, 2022

nmap -sT targetIP/hostname

nmap –script vuln targetIP/hostname

-O trys to identify Operating System, example nmap -sT -O targetIP/hostnam

  • Linux
  • nmap
  • scan
  • security

You may also like

Published November 19, 2020

SSH Notifications via email

IP=”$(echo $SSH_CONNECTION | cut -d ” ” -f 1)”HOSTNAME=$(hostname)NOW=$(date +”%e %b %Y, %a %r”) echo ‘Someone from ‘$IP’ logged into ‘$HOSTNAME’ on […]

Ex2010 – Ex2003
Published May 3, 2012

Ex2010 – Ex2003

During as SBS2003 migration to SBS2011, while decommissioning the source server (SBS2003) before Exchange 2003 can be removed you will have to remove the […]

Published November 4, 2019

Enable Mikrotik firewall rule using comment field

The below can be used in a schedule or script to control rules, just change “enable” to “disable” to disable the rule […]

Published July 28, 2011

Cloud Computing

Post navigation

  • Previous post Remote Failover testing
  • Back to post list
  • Next post WiFi

© 2026  – All rights reserved

Powered by WP – Designed with the Customizr Theme