kali_network_nmap_scan
Perform network port scanning to discover hosts, services, and potential vulnerabilities using Nmap capabilities including TCP/UDP scans, service detection, and OS fingerprinting.
Instructions
Perform network port scanning using Nmap.
Nmap (Network Mapper) is a powerful network scanner for discovering hosts, services, and potential vulnerabilities.
Capabilities:
TCP SYN, Connect, UDP, and stealth scans
Service version detection (-sV)
OS fingerprinting (-O, requires root)
NSE script execution
Multiple output formats
Usage Notes:
TCP SYN scan requires root privileges
Use appropriate timing for stealth vs speed
Large port ranges increase scan time significantly
Example:
Quick scan: target="192.168.1.1", ports="22,80,443"
Full scan: target="10.0.0.0/24", ports="-", timing="aggressive"
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| target | Yes | Target IP address, hostname, or CIDR range (e.g., '192.168.1.1', 'example.com', '10.0.0.0/24') | |
| ports | No | Port specification (e.g., '22', '1-1000', '22,80,443', '-' for all ports). Default: top 1000 ports | |
| scan_type | No | Nmap scan type (tcp_syn requires root) | tcp_syn |
| timing | No | Timing template: paranoid (T0) to insane (T5) | normal |
| os_detection | No | Enable OS detection (-O, requires root) | |
| service_version | No | Probe for service versions (-sV) | |
| script_scan | No | NSE script(s) to run (e.g., 'vuln', 'default', 'http-*') | |
| aggressive | No | Enable aggressive scan (-A: OS, version, script, traceroute) | |
| output_format | No | Output format | text |
| timeout | No | Scan timeout in seconds |