Description
Runs an nmap scan against one or more specified targets with selectable scan technique, port scope, service and OS detection, timing controls, and an execution timeout, returning raw command output.
Overview
This tool executes the nmap network scanner against one or more specified hosts, IP addresses, or CIDR ranges using a constrained, parameterized interface. It supports multiple TCP and UDP scan techniques, optional port scoping, service and operating system detection, configurable timing templates, and a bounded execution timeout. The scan is executed via /bin/sh -c using the SpecterInsight Run-Command interface and returns unmodified command output for downstream parsing and analysis.
Parameters
| Name | Type | Required | Default | Description |
|---|---|---|---|---|
Targets |
String[] | Yes | — | One or more hostnames, IP addresses, or CIDR ranges to scan. |
Ports |
String | No | — | Ports or port ranges to scan (e.g. 22,80,443 or 1-1000). |
ScanType |
String | No | -sT |
Nmap scan technique. Allowed values: -sT, -sS, -sU, -sA, -sN, -sF, -sX. |
ServiceDetection |
Switch | No | false |
Enables service and version detection (-sV). |
OsDetection |
Switch | No | false |
Enables operating system detection (-O). |
Timing |
Integer | No | 3 |
Nmap timing template (-T0 to -T5). Higher values increase speed and noise. |
Timeout |
Integer | No | 600 |
Maximum execution time in seconds before the command is terminated. |
Notes
- The scan is executed with host discovery disabled (
-Pn). - Raw standard output is returned on success; raw standard error is returned on failure.
- Certain scan types (e.g.
-sS,-sU,-O) may require elevated privileges on the target system. - Large CIDR ranges or slow UDP scans may require increased timeout values to complete.
- When multiple targets are specified, they may be scanned within a single
nmapinvocation, resulting in interleaved per-host output.
