nmap
Verified for current stable LTS
Nmap Command: Scan For Web Servers On Standard Ports
Use for scan for web servers on standard ports with Nmap. Exact CLI syntax to scan for web servers on standard ports using Nmap.
When to use this: Use for scan for web servers on standard ports with Nmap.
Command Syntax
nmap --script "http-*" <ip_or_host1,ip_or_host2,...> -p 80,443 nmap --script "http-*" <ip_or_host1,ip_or_host2,...> -p 80,443 Command Breakdown
--script- Command Option
- Tool-specific option used by this command invocation.
-p- Command Option
- Tool-specific option used by this command invocation.
FAQ
Purpose: Exact syntax to scan for web servers on standard ports using Nmap.
Test path: Replace placeholders and run destructive commands in a disposable workspace first.
Flag behavior: Tool version, platform, and shell can change behavior.
Improve This Command
Suggest a correction, safer default, or version-specific note for this entry.
Related Operations
Nmap Command: Enable Os Detection And Traceroute From File
sudo nmap -A -iL <path/to/file.txt> Nmap Command: Evade Ids Ips With Slow Scan sudo nmap -T0 -D <decoy_ip1,decoy_ip2,...> --source-port <53> -f --data-length <16> -Pn <ip_or_host> Nmap Command: Ping Sweep Subnet Aggressively nmap -T5 -sn <192.168.0.0/24|ip_or_hostname1,ip_or_hostname2,...> Nmap Command: Scan Carefully With Default And Safe Scripts nmap --script "default and safe" <ip_or_host1,ip_or_host2,...> Nmap Command: Scan Specific List Of Ports nmap -p <port1,port2,...> <ip_or_host1,ip_or_host2,...>