Create
Learn
Share

NMAP Timing and Performance

rename
dfredde's version from 2017-10-08 22:45

Section 1

Question Answer
-T0 Example: nmap 192.168.1.1 -T0Paranoid (0) Intrusion Detection System evasion
-T1 Example: nmap 192.168.1.1 -T1Sneaky (1) Intrusion Detection System evasion
-T2 Example: nmap 192.168.1.1 -T2Polite (2) slows down the scan to use less bandwidth and use less target machine resources
-T3 Example: nmap 192.168.1.1 -T3Normal (3) which is default speed
-T4 Example: nmap 192.168.1.1 -T4Aggressive (4) speeds scans; assumes you are on a reasonably fast and reliable network
-T5 Example: nmap 192.168.1.1 -T5Insane (5) speeds scan; assumes you are on an extraordinarily fast network
memorize

Section 2

Question Answer
--host-timeout <time> Example: 1s; 4m; 2hGive up on target after this long
--min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout <time> Example: 1s; 4m; 2hSpecifies probe round trip time
--min-hostgroup/max-hostgroup <size<size> Example: 50; 1024Parallel host scan group sizes
--min-parallelism/max-parallelism <numprobes> Example: 10; 1Probe parallelization
--scan-delay/--max-scan-delay <time> Example: 20ms; 2s; 4m; 5hAdjust delay between probes
--max-retries <tries> Example: 3Specify the maximum number of port scan probe retransmissions
--min-rate <number> Example: 100Send packets no slower than <numberr> per second
--max-rate <number> Example: 100 Send packets no faster than <number> per second
memorize