Recon with Nmap

First ran the Nmap scan. This is usually my basic port range. Depending on what I find or what I think I might be missing from the ports that are displayed, I will run a wider range scan.

"-sS" is usually a default but I run it out of habit, it means TCP SYN port scan

"-sV" Attempts to determine the version of the service running on port

"-p" are the ports which I specified 0-10000.

Last updated