will be returned to the main menu. Now open a new terminal and type the following command to use Nmap for scanning open ports.
sudo nmap -n -PN -sT -sU -p- <ip address/domain>
Breaking down the command:
n – It speeds up the scan by skipping reverse DNS lookup.
PN – It assumes the host is online and doesn’t show “host seems down.”
sT – It scans for TCP connections.
sU – It scans for UDP connections.
Combining all these, it will scan for all TCP and UDP open ports.
You can see in the above image Nmap gives results of the open ports and services used. Like this, you can install many tools according to your pen-testing needs in the same way.