100% found this document useful (2 votes)
952 views2 pages

CEH Commands

The document lists commands for various network scanning and security tools including Nmap, hping2, Netcat, tcpdump, and Snort. Nmap commands are used for port scanning and operating system detection. Hping2 commands allow setting specific TCP flags. Netcat commands support listening, connecting and transferring data over TCP and UDP. Tcpdump commands capture and analyze network traffic. Snort commands provide options for rule application, logging and network interface configuration.

Uploaded by

Helen Tseggai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
952 views2 pages

CEH Commands

The document lists commands for various network scanning and security tools including Nmap, hping2, Netcat, tcpdump, and Snort. Nmap commands are used for port scanning and operating system detection. Hping2 commands allow setting specific TCP flags. Netcat commands support listening, connecting and transferring data over TCP and UDP. Tcpdump commands capture and analyze network traffic. Snort commands provide options for rule application, logging and network interface configuration.

Uploaded by

Helen Tseggai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

Ethical Hacker Certified

Exam: 312-50

Nmap Commands
1. nmap -O = operating system detection
2. nmap sA = ACK Scan
3. nmap sF = FIN Scan
4. nmap sI = Idle scan
5. nmap -sO = ip protocol scan
6. nmap -sP = ping a host and nothing more
7. nmap -sR = RPC scan
8. nmap -sS = tcp SYN scan
9. nmap -sT
10. nmap -sU = scan for UDP ports
11. nmap -sV = services version detection
12. nmap -TX
13. nmap -PP = ICMP timestamp request
14. nmap -F = fast mode: scan fewer ports than default
15. nmap -hU
16. nmap -u -o -w
17. nmap -h = help summary page
18. nmap -p = indicates which ports to scan
19. nmap -u -v -w
20. nmap -PT
21. nmap -P
22. nmap -C
23. nmap -D = Cloak a scan with decoys
24. nmap -P
25. nmap -X
26. nmap -T = Takes one of five arguments, given by name or number.
paranoid (0) - No parallel scanning. 5 minutes between sending packets
sneaky (1) - No parallel scanning. 15 seconds between sending packets
polite (2) - No parallel scanning. 0.4 seconds between sending packets.
normal (3) - Default scanning. Tries to be very fast without overloading the
network.
aggressive (4) - Faster than normal, but loads the network.
insane (5) - Parallel scans, times out hosts in 15 minutes, won't wait more than
0.3 seconds for an individual probe.
Hping Commands
1. hping2 -F = fin set FIN flag
2. hping2 -S = syn set SYN flag
3. hping2 -R = rst set RST flag
4. hping2 -P = push set PUSH flag
5. hping2 -A = ack set ACK flag
6. hping2 -U = urg set URG flag
1

Ethical Hacker Certified


Exam: 312-50
7. hping2 -X = xmas set X unused flag (0x40)
8. hping2 -Y = ymas set Y unused flag (0x80
Netcat Commands
1. nc -l = listen mode
2. nc -p = Local port (In listen mode, this is port listened on. In client mode, this is
source port for all packets sent.
3. nc -s
4. nc -e = program to execute
5. nc u = UDP mode (default is TCP)
6. nc vv = be very verbose, printing even more details on standard error
7. nc -c
8. nc -w
9. nc -v = be verbose, printing out messages on standard error, such as when a
connection occurs
10. nc -h -U
11. nc -hU
12. nc -sU -p
13. nc -sS -O
Tcpdump Commands
1. tcpdump r = file
2. tcpdump w = write the raw packets to file rather than parsing and printing them out
3. tcpdump -vde
4. tcpdump -l
Snort Commands
1. snort -dev h = set the home network
2. snort -dev -l = log packets
3. snort -dev o = change the order in which the rules are applied to packets
4. snort -dev p = turn off promiscuous mode sniffing

You might also like