Skip to main content

Nmap: how to Perform an Aggressive Scan (part-9)

Perform an Aggressive Scan

The -A parameter instructs Nmap to perform an aggressive scan.

Usage syntax: nmap -A [target]

# nmap -A 10.10.1.51
Starting Nmap 5.00 ( http://nmap.org ) at 2009-08-10 09:39 CDT
Interesting ports on 10.10.1.51:
Not shown: 999 closed ports
PORT
STATE SERVICE VERSION
80/tcp open
http
Linksys WAP54G wireless-G router http config
|_ html-title: 401 Unauthorized
|
http-auth: HTTP Service requires authentication
|_
Auth type: Basic, realm = Linksys WAP54G
MAC Address: 00:12:17:AA:66:28 (Cisco-Linksys)
Device type: general purpose
Running: Linux 2.4.X
OS details: Linux 2.4.18 - 2.4.35 (likely embedded)
Network Distance: 1 hop
Service Info: Device: WAP
OS and Service detection performed. Please report any incorrect
results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 9.61 seconds

Output of an aggressive scan

The aggressive scan selects some of the most commonly used options within Nmap
and is provided as a simple alternative to typing a long string of command line
arguments. The -A parameter is a synonym for several advanced options (like -O -sC
--traceroute) which can also be accessed individually and are covered later in this
book.