http://y7egb5vi45k74makeixpfb7jnimfxm3gf233lb3ke2ldonozjk55nvad.onion/nmap_notes.html
. -0 Scan for OS -v verbose output -f Fragment the packet -oA Output all formats, XML, Nmap, and Grepable IP ADDRESS The output file name -p 1-65535 Port range to scan -p- Scan ports 1 - 65535 –spoof-mac Spoof the mac address -g 53 Use source port 53 (dns) –data_length -D Spray with decoy packets. Remove if you think the scan is too
noisy. -T2 Normal scan speed. Use T1 to slow it down. -Pn Skip the ping step. Normally nmap pings the target first and if it
gets a response it continues the...