{"id":151,"date":"2022-10-03T11:34:00","date_gmt":"2022-10-03T11:34:00","guid":{"rendered":"https:\/\/sajinshivdas.com\/cybersecurity\/?p=151"},"modified":"2023-03-27T08:43:30","modified_gmt":"2023-03-27T08:43:30","slug":"zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings","status":"publish","type":"post","link":"https:\/\/sajinshivdas.com\/cybersecurity\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\/","title":{"rendered":"Zenmap GUI (Nmap): Choosing a Preset Profiles &#038; Profile Settings"},"content":{"rendered":"<p>Zenmap is a graphical user interface for Nmap, a widely used free port scanner. Here, we&#8217;ll dive deep into the 10 predefined scan types that come with it. Some of the scan kinds are rather evident, yet some readers may miss them.<\/p>\n<p><em><strong>Initiated in 1997 by Fyodor (Gordon Lyon), Nmap has been continuously improved upon since then. Fyodor, you&#8217;ve done an incredible job developing and supporting this fantastic program<\/strong>.<\/em><\/p>\n<h1><\/h1>\n<h2><a name=\"_Toc115694391\"><\/a>I.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The Presets Profiles<\/h2>\n<p>Before we dive into the specifics of the various settings, I&#8217;ll give a quick rundown of the defaults that Zenmap provides.<\/p>\n<h3><a name=\"_Toc115694392\"><\/a>A.\u00a0\u00a0\u00a0 Intense scan<\/h3>\n<p><strong>Command: nmap -T4 -A \u2013v<\/strong><\/p>\n<p>Scanning the most popular TCP ports is a relatively quick process. It&#8217;ll try to identify the OS flavor, the installed services, and their respective versions.<\/p>\n<p>This results from use the -A option, which will attempt to determine services, versions, and OS, as well as a rapid timing template (-T4). The scan will progress in real time, and we&#8217;ll get plenty of updates due to the verbose output (-v) option.<\/p>\n<h3><a name=\"_Toc115694393\"><\/a>B.\u00a0\u00a0\u00a0 Intense scan plus UDP<\/h3>\n<p><strong>Command: nmap -sS -sU -T4 -A \u2013v<\/strong><\/p>\n<p>The only difference from a standard Intense scan is that UDP ports will additionally be probed (-sU).<\/p>\n<p>The -sS option instructs Nmap to scan TCP ports using SYN packets as well. Because this scan includes UDP ports, -sS must be explicitly defined.<\/p>\n<h3><a name=\"_Toc115694394\"><\/a>C.\u00a0\u00a0\u00a0 Intense scan, all TCP ports<\/h3>\n<p><strong>Command: nmap -p 1-65535 -T4 -A -v<\/strong><\/p>\n<p>Check all TCP port entries.<\/p>\n<p>Typically, Nmap scans a list of the 1000 most popular protocols, however in this example we will scan every port from 1 to 65535. (max). nmap-services is a file that contains a listing of the 1000 most prevalent protocols.<\/p>\n<h3><a name=\"_Toc115694395\"><\/a>D.\u00a0\u00a0\u00a0 Intense scan, no ping<\/h3>\n<p><strong>Command: nmap -T4 -A -v \u2013Pn<\/strong><\/p>\n<p>Similar to other intense scans, with the assumption that the host is online. Useful if the target is blocking ping requests, but you already know it is online.<\/p>\n<h3><a name=\"_Toc115694396\"><\/a>E.\u00a0\u00a0\u00a0 Ping scan<\/h3>\n<p><strong>Command: nmap -T4 -A -v \u2013Pn<\/strong><\/p>\n<p>Ping only the target; do not perform a port scan.<\/p>\n<h3><a name=\"_Toc115694397\"><\/a>F.\u00a0\u00a0\u00a0\u00a0 Quick scan<\/h3>\n<p><strong>Command: nmap -T4 -F<\/strong><\/p>\n<p>Scan more quickly than the intensive scan by restricting the number of TCP ports searched to the 100 most common TCP ports<\/p>\n<h3><a name=\"_Toc115694398\"><\/a>G.\u00a0\u00a0\u00a0 Quick scan plus<\/h3>\n<p><strong>Command: nmap -sV -T4 -O -F \u2013version-light <\/strong><\/p>\n<p>Add some version and operating system detection and you have Quick scan plus.<\/p>\n<h3><a name=\"_Toc115694399\"><\/a>H.\u00a0\u00a0\u00a0 Quick traceroute<\/h3>\n<p><strong>Command: nmap -sn \u2013traceroute <\/strong><\/p>\n<p>Use this option to identify hosts and routers during a network scan. It will traceroute and ping every host in the target.<\/p>\n<h3><a name=\"_Toc115694400\"><\/a>I.\u00a0\u00a0\u00a0\u00a0\u00a0 Regular scan<\/h3>\n<p><strong>Command: nmap <\/strong><\/p>\n<p>Default everything. This indicates that a TCP SYN scan will be performed on the 1,000 most frequent TCP ports utilizing ICMP Echo request (ping) for host detection.<\/p>\n<h3><a name=\"_Toc115694401\"><\/a>J.\u00a0\u00a0\u00a0\u00a0\u00a0 Slow comprehensive scan<\/h3>\n<p><strong>Command:\u00a0nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 \u2013script \u201cdefault or (discovery and safe)\u201d <\/strong><\/p>\n<p>This scan contains a large number of options, making it initially difficult to comprehend. However, it is not as hard as it may seem upon closer inspection of the possibilities. The scan can be described as &#8220;Intense scan plus UDP&#8221; with additional characteristics.<\/p>\n<p>It will exert considerable effort in detecting hosts, not giving up if the initial ping attempt fails. It employs three distinct protocols to detect hosts: TCP, UDP, and SCTP.<\/p>\n<p>Based on the most popular TCP and UDP services, if a host is recognized, an attempt will be made to identify the operating system, services, and version of the host. In addition, the scan disguises itself as source port 53. (DNS).<\/p>\n<h2><a name=\"_Toc115694402\"><\/a>II.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The Options<\/h2>\n<p><strong>T4<\/strong><\/p>\n<p>This is a potential time template option. The numbers run from 0 to 5, with 5 being the quickest and 0 the slowest.<\/p>\n<p>What is hence a timing template? The makers of Nmap are essentially providing the user with a simple means of adjusting Nmap&#8217;s performance. The handbook for Nmap translates the various numbers as follows:<\/p>\n<p>0: paranoid 1: sneaky 2: polite 3: normal 4: aggressive 5: insane<\/p>\n<p>Again, this means that 1 and 2 are used for IDS evasion, 3 is the default, and 4 and 5 are extremely rapid scans. Using -T2 to perform a standard scan on a single host took 400 seconds, but -T5 required only 0.07 seconds. Refer to the Timing and Performance section of the manual for additional information.<\/p>\n<p><strong>-A \u00a0 \u00a0<\/strong><\/p>\n<p>This option enables Nmap to attempt to identify the target operating system, services, and versions. In addition, traceroute and NSE scripts are utilized to detect extra information. This scan is fairly noisy because it employs many scans. Applying NSE scripts is the default configuration for scripts.<\/p>\n<p>The -A option is equivalent to applying the following options to your scan: <strong>-sC -sV -O \u2013traceroute<\/strong><\/p>\n<p><strong>-v \u00a0 \u00a0<\/strong><\/p>\n<p>Increased verbosity. This will give your extra information in the data outputted by Nmap.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>-sS \u00a0 \u00a0<\/strong><\/p>\n<p>Scan for TCP SYN connections. This just indicates that Nmap will send a TCP SYN packet as any other application would. If the port is open, the application must respond with SYN\/ACK; however, in order to prevent half-open connections, Nmap will send a RST to close the connection.<\/p>\n<p>&#8211;<strong>sU \u00a0 \u00a0<\/strong><\/p>\n<p>Run a UDP scan. Because UDP is unreliable, it is more difficult to establish whether ports are open compared to TCP. The UDP scan sends an empty-headed UDP packet to the target port. If the port is closed, the operating system should respond with an ICMP port unreachable error. If the port is open, however, the service may or may not respond.<\/p>\n<p><strong>-sN \u00a0\u00a0<\/strong><\/p>\n<p>TCP Null scan. This option transmits TCP packets without any of the TCP flags specified. If the scan returns a RST packet, the port is closed. If nothing is returned, however, the port is either filtered or open.<\/p>\n<p><strong>-sV \u00a0 \u00a0<\/strong><\/p>\n<p>Actively probe open ports to determine the service and version being used. This scan against my webserver resulted in the transmission of 14 packets between the client and server, as opposed to just 2 packets during a standard SYN scan.<\/p>\n<p><strong>-p \u00a0 \u00a0<\/strong><\/p>\n<p>Comma seperated list of ports being scanned. Easy way to define only a few ports to scan or increase the scope of the scan to e.g. every available TCP port.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>-F \u00a0 \u00a0<\/strong><\/p>\n<p>Fast mode. Instead of scanning as many ports as the Default\u00a0scan, the rapid scan just scans a handful. In comparison, when I scanned in fast mode, 202 packets were transferred, whereas with the default scan (no settings), 2002 packets were transmitted. Both scans revealed that ports 80 and 22 are accessible on the target host.<\/p>\n<p><strong>&#8211;<\/strong><strong>O<\/strong><\/p>\n<p>Make Nmap attempt to determine the OS type. The method of operating system detection can be both complex and straightforward. It depends on a variety of factors that I cannot list here. Examining the TTL (Time to live) field on OS-sent packets is a straightforward way to determine whether it is a Windows or Unix operating system. Unix defaults to 64 whereas Windows defaults to 128.<\/p>\n<p><strong>\u2013traceroute \u00a0\u00a0<\/strong><\/p>\n<p>Perform a traceroute to the target.<\/p>\n<p><strong>\u2013version-light \u00a0 \u00a0<\/strong><\/p>\n<p>It limits the number of probes sent to the service during service detection scans (-sV and -A). This option restricts the service probes to those that are most likely to return a successful response. If you are wondering about the probes that Nmap sends, I recommend using the \u2013version-trace option to obtain comprehensive scan information.<\/p>\n<p><strong>-PE \u00a0 \u00a0<\/strong><\/p>\n<p>This option determines whether or not Nmap uses ICMP echo requests to determine whether or not a host is online. This is the same as pinging the target host to see whether or not it is online.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>-PP \u00a0 \u00a0<\/strong><\/p>\n<p>This specifies that instead of a conventional ICMP echo request, Nmap should send an ICMP Timestamp request when assessing if a host is up or not. This unique sort of ICMP request was once used to synchronize timestamps between connecting nodes, but has since been supplanted by the more widespread network time protocol.<\/p>\n<p><strong>-PS \u00a0 \u00a0<\/strong><\/p>\n<p>Additionally, used for host detection. This option relies exclusively on a port (default 80) to respond to an empty SYN packet, as is the TCP standard. Often, the simplest solution is the best one. This option receives the argument 80,443 in the predefined scans. These are common webserver port numbers that are often accessible on targets.<\/p>\n<p><strong>&#8211;<\/strong><strong>PA<\/strong><strong> \u00a0 \u00a0<\/strong><\/p>\n<p>Similar to the -PS option, this one instead transmits a TCP packet with the ACK flag set. This should prompt the server listening on the specified port to react with a RST message, as it is not expecting any data to be acknowledged by an ACK packet. Occasionally, firewall administrators configure the firewall to drop inbound SYN packets in order to prohibit traffic, allowing ACK messages to flow through.<\/p>\n<p>In the predefined scans, the input 3389 is passed to this option. This is the port for the remote desktop service, which is commonly enabled on servers. When other methods of host detection fail, this may enhance the likelihood of success.<\/p>\n<p><strong>-PU<\/strong><\/p>\n<p>This command transmits a UDP packet to the target port (default: 40125) in an attempt to elicit a &#8220;ICMP Port unreachable&#8221; response from the server. Occasionally, firewalls drop just TCP packets and ignore UDP packets, enabling these packets to pass. Some setups also permit the transmission of any form of packet when only TCP should be permitted. A sneaky technique would be to disguise your host discovery as a UDP packet on port 53 (DNS).<\/p>\n<p><strong>-PY \u00a0 \u00a0<\/strong><\/p>\n<p>Very much like a TCP SYN scan, this just utilizes the SCTP (<a href=\"http:\/\/en.wikipedia.org\/wiki\/Stream_Control_Transmission_Protocol\">Stream Control Transmission Protocol<\/a>) instead.<\/p>\n<p><strong>-g \u00a0 \u00a0<\/strong><\/p>\n<p>Specify the source port to be used. Note that this is distinct from the destination port that is being scanned. The primary application for this is evading IDS or blending in with other regular data.<\/p>\n<p><strong>\u2013script \u00a0 \u00a0<\/strong><\/p>\n<p>Through NSE (Nmap scripting engine), it is possible for anyone to create Nmap-specific custom scripts. This parameter accepts a comma-separated list of NSE script-containing files, categories, and directories. Because NSE supports expressions you can tell Nmap to load scripts in many different ways.<\/p>\n<p>With the &#8220;default or (discovery and safe)&#8221; parameter, Nmap will only load scripts from the discovery category that are also in the safe category.<\/p>\n<p><strong>-Pn \u00a0 \u00a0<\/strong><\/p>\n<p>Assume the host is up thus skipping the host discovery phase.<\/p>\n<p><strong>-sn \u00a0 \u00a0<\/strong><\/p>\n<p>Send only ping packets to the target; do not perform port scanning. This is useful if you need to determine which hosts are nearby, but do not wish to scan them at this time. Not to be confused with the TCP Null scan (-sN) option; Nmap is case sensitive.<\/p>\n<h2><a name=\"_Toc115694391\"><\/a>\u00a0\u00a0\u00a0\u00a0\u00a0 I.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The Presets Profiles<\/h2>\n<p>Before we go into the different options in use I will make a brief explanation of each of the presets that come with Zenmap.<\/p>\n<h3><a name=\"_Toc115694392\"><\/a>A.\u00a0\u00a0\u00a0 Intense scan<\/h3>\n<p><strong>Command: nmap -T4 -A \u2013v<\/strong><\/p>\n<p>Should be reasonable quick, scan the most common TCP ports. It will make an effort in determining the OS type and what services and their versions are running.<\/p>\n<p>This comes from having a pretty fast timing template (-T4) and for using the -A option which will try determine services, versions and OS.\u00a0With the verbose output (-v) it will also give us a lot of feedback as Nmap makes progress in the scan.<\/p>\n<h3><a name=\"_Toc115694393\"><\/a>B.\u00a0\u00a0\u00a0 Intense scan plus UDP<\/h3>\n<p><strong>Command: nmap -sS -sU -T4 -A \u2013v<\/strong><\/p>\n<p>Same as the regular Intense scan, just that we will also scan UDP ports (-sU).<\/p>\n<p>The -sS option is telling Nmap that it should also scan TCP ports using SYN packets. Because this scan includes UDP ports this explicit definition of -sS is necessary<\/p>\n<h3><a name=\"_Toc115694394\"><\/a>C.\u00a0\u00a0\u00a0 Intense scan, all TCP ports<\/h3>\n<p><strong>Command: nmap -p 1-65535 -T4 -A -v<\/strong><\/p>\n<p>Leave no TCP ports unchecked.<\/p>\n<p>Normally Nmap scans a list of 1000 most common protocols, but instead we will in this example scan everything from port 1 to 65535 (max). The 1000 most common protocols listing can be found in the file called nmap-services.<\/p>\n<h3><a name=\"_Toc115694395\"><\/a>D.\u00a0\u00a0\u00a0 Intense scan, no ping<\/h3>\n<p><strong>Command: nmap -T4 -A -v \u2013Pn<\/strong><\/p>\n<p>Just like the other intense scans, however this will assume the host is up. Usefull if the target is blocking ping request and you already know the target is up.<\/p>\n<h3><a name=\"_Toc115694396\"><\/a>E.\u00a0\u00a0\u00a0 Ping scan<\/h3>\n<p><strong>Command: nmap -T4 -A -v \u2013Pn<\/strong><\/p>\n<p>Do only a ping only on the target, no port scan.<\/p>\n<h3><a name=\"_Toc115694397\"><\/a>F.\u00a0\u00a0\u00a0\u00a0 Quick scan<\/h3>\n<p><strong>Command: nmap -T4 -F<\/strong><\/p>\n<p>Scan faster than the intense scan by limiting the number of TCP ports scanned to only the top 100 most common TCP ports.<\/p>\n<h3><a name=\"_Toc115694398\"><\/a>G.\u00a0\u00a0\u00a0 Quick scan plus<\/h3>\n<p><strong>Command: nmap -sV -T4 -O -F \u2013version-light <\/strong><\/p>\n<p>Add a little bit of version and OS detection and you got the Quick scan plus.<\/p>\n<h3><a name=\"_Toc115694399\"><\/a>H.\u00a0\u00a0\u00a0 Quick traceroute<\/h3>\n<p><strong>Command: nmap -sn \u2013traceroute <\/strong><\/p>\n<p>Use this option when you need to determine hosts and routers in a network scan. It will traceroute and ping all hosts defined in the target.<\/p>\n<h3><a name=\"_Toc115694400\"><\/a>I.\u00a0\u00a0\u00a0\u00a0\u00a0 Regular scan<\/h3>\n<p><strong>Command: nmap <\/strong><\/p>\n<p>Default everything. This means it will issue a TCP SYN scan for the most common 1000 TCP ports, using ICMP Echo request (ping) for host detection.<\/p>\n<h3><a name=\"_Toc115694401\"><\/a>J.\u00a0\u00a0\u00a0\u00a0\u00a0 Slow comprehensive scan<\/h3>\n<p><strong>Command:\u00a0nmap -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 \u2013script \u201cdefault or (discovery and safe)\u201d <\/strong><\/p>\n<p>This scan has a whole bunch of options in it and it may seem daunting to understand at first. It is however not so complicated once you take a closer look at the options. The scan can be said to be a \u201cIntense scan plus UDP\u201d plus some extras features.<\/p>\n<p>It will put a whole lot of effort into host detection, not giving up if the initial ping request fails. It uses three different protocols in order to detect the hosts; TCP, UDP and SCTP.<\/p>\n<p>If a host is detected it will do its best in determining what OS, services and versions the host are running based on the most common TCP and UDP services. Also the scan\u00a0camouflages\u00a0itself as source port 53 (DNS).<\/p>\n<h2><a name=\"_Toc115694402\"><\/a>\u00a0\u00a0\u00a0 II.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The Options<\/h2>\n<p><strong>T4<\/strong><\/p>\n<p>This is an option for timing template. Numbers range from 0-5 where 5 is the fastest and 0 is the slowest.<\/p>\n<p>So what is a timing template? Basically it is Nmap\u2019s developers giving the user an easy way of tuning how fast Nmap performs. The Nmap manual translates the different numbers to this:<br \/>\n0: paranoid 1: sneaky 2: polite 3: normal 4: aggressive 5: insane<\/p>\n<p>Again, this translates into 1-2 being used for IDS evasion, 3 is the default and 4-5 is really quick scans. As an example when I run a regular scan on one host with -T2 it took me 400 seconds while -T5 0.07 seconds. Read more about this in the <a href=\"http:\/\/nmap.org\/book\/man-performance.html\">Timing and Performance<\/a> section of the manual.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zenmap is a graphical user interface for Nmap, a widely used free port scanner. Here, we&#8217;ll dive deep into the 10 predefined scan types that&#8230;<\/p>\n","protected":false},"author":1,"featured_media":6364,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[47,48],"class_list":{"0":"post-151","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-utilities","8":"tag-nmap","9":"tag-zenmap"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zenmap GUI (Nmap): Choosing a Preset Profiles &amp; Profile Settings - Sajin Shivdas | Cybersecurity<\/title>\n<meta name=\"description\" content=\"Zenmap is a graphical user interface for Nmap, a widely used free port scanner. Here, we&#039;ll dive deep into the 10 predefined scan types that come with it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zenmap GUI (Nmap): Choosing a Preset Profiles &amp; Profile Settings - Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Zenmap is a graphical user interface for Nmap, a widely used free port scanner. Here, we&#039;ll dive deep into the 10 predefined scan types that come with it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\/\" \/>\n<meta property=\"og:site_name\" content=\"Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-03T11:34:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-27T08:43:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/12067355_4884273-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sajin Shivdas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sajin Shivdas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\\\/\"},\"author\":{\"name\":\"Sajin Shivdas\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"headline\":\"Zenmap GUI (Nmap): Choosing a Preset Profiles &#038; Profile Settings\",\"datePublished\":\"2022-10-03T11:34:00+00:00\",\"dateModified\":\"2023-03-27T08:43:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\\\/\"},\"wordCount\":2370,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/12067355_4884273-scaled.jpg\",\"keywords\":[\"nmap\",\"zenmap\"],\"articleSection\":[\"Utilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\\\/\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\\\/\",\"name\":\"Zenmap GUI (Nmap): Choosing a Preset Profiles & Profile Settings - Sajin Shivdas | Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/12067355_4884273-scaled.jpg\",\"datePublished\":\"2022-10-03T11:34:00+00:00\",\"dateModified\":\"2023-03-27T08:43:30+00:00\",\"description\":\"Zenmap is a graphical user interface for Nmap, a widely used free port scanner. Here, we'll dive deep into the 10 predefined scan types that come with it.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/12067355_4884273-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/12067355_4884273-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zenmap GUI (Nmap): Choosing a Preset Profiles &#038; Profile Settings\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\",\"name\":\"sajinshivdas.com\",\"description\":\"Cybersecurity - Information security Resources, Articles and Latest News\",\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"alternateName\":\"Sajin Shivdas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\",\"name\":\"Sajin Shivdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"width\":1000,\"height\":500,\"caption\":\"Sajin Shivdas\"},\"logo\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\"},\"sameAs\":[\"http:\\\/\\\/sajinshivdas.com\\\/security\",\"www.linkedin.com\\\/in\\\/sajin-shivdas\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zenmap GUI (Nmap): Choosing a Preset Profiles & Profile Settings - Sajin Shivdas | Cybersecurity","description":"Zenmap is a graphical user interface for Nmap, a widely used free port scanner. Here, we'll dive deep into the 10 predefined scan types that come with it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sajinshivdas.com\/cybersecurity\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\/","og_locale":"en_US","og_type":"article","og_title":"Zenmap GUI (Nmap): Choosing a Preset Profiles & Profile Settings - Sajin Shivdas | Cybersecurity","og_description":"Zenmap is a graphical user interface for Nmap, a widely used free port scanner. Here, we'll dive deep into the 10 predefined scan types that come with it.","og_url":"https:\/\/sajinshivdas.com\/cybersecurity\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\/","og_site_name":"Sajin Shivdas | Cybersecurity","article_published_time":"2022-10-03T11:34:00+00:00","article_modified_time":"2023-03-27T08:43:30+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/12067355_4884273-scaled.jpg","type":"image\/jpeg"}],"author":"Sajin Shivdas","twitter_misc":{"Written by":"Sajin Shivdas","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\/#article","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\/"},"author":{"name":"Sajin Shivdas","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"headline":"Zenmap GUI (Nmap): Choosing a Preset Profiles &#038; Profile Settings","datePublished":"2022-10-03T11:34:00+00:00","dateModified":"2023-03-27T08:43:30+00:00","mainEntityOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\/"},"wordCount":2370,"commentCount":0,"publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/12067355_4884273-scaled.jpg","keywords":["nmap","zenmap"],"articleSection":["Utilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sajinshivdas.com\/cybersecurity\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\/","url":"https:\/\/sajinshivdas.com\/cybersecurity\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\/","name":"Zenmap GUI (Nmap): Choosing a Preset Profiles & Profile Settings - Sajin Shivdas | Cybersecurity","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\/#primaryimage"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/12067355_4884273-scaled.jpg","datePublished":"2022-10-03T11:34:00+00:00","dateModified":"2023-03-27T08:43:30+00:00","description":"Zenmap is a graphical user interface for Nmap, a widely used free port scanner. Here, we'll dive deep into the 10 predefined scan types that come with it.","breadcrumb":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sajinshivdas.com\/cybersecurity\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\/#primaryimage","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/12067355_4884273-scaled.jpg","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/12067355_4884273-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/zenmap-gui-nmap-choosing-a-preset-profiles-profile-settings\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sajinshivdas.com\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"Zenmap GUI (Nmap): Choosing a Preset Profiles &#038; Profile Settings"}]},{"@type":"WebSite","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website","url":"https:\/\/sajinshivdas.com\/cybersecurity\/","name":"sajinshivdas.com","description":"Cybersecurity - Information security Resources, Articles and Latest News","publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"alternateName":"Sajin Shivdas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sajinshivdas.com\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6","name":"Sajin Shivdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","width":1000,"height":500,"caption":"Sajin Shivdas"},"logo":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png"},"sameAs":["http:\/\/sajinshivdas.com\/security","www.linkedin.com\/in\/sajin-shivdas"]}]}},"_links":{"self":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=151"}],"version-history":[{"count":0,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/151\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media\/6364"}],"wp:attachment":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/categories?post=151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/tags?post=151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}