Nmap Scan

Description

Runs an nmap scan against one or more specified targets with selectable scan technique, port scope, service and OS detection, timing controls, and an execution timeout, returning raw command output.

Overview

This tool executes the nmap network scanner against one or more specified hosts, IP addresses, or CIDR ranges using a constrained, parameterized interface. It supports multiple TCP and UDP scan techniques, optional port scoping, service and operating system detection, configurable timing templates, and a bounded execution timeout. The scan is executed via /bin/sh -c using the SpecterInsight Run-Command interface and returns unmodified command output for downstream parsing and analysis.

Parameters

Name Type Required Default Description
Targets String[] Yes One or more hostnames, IP addresses, or CIDR ranges to scan.
Ports String No Ports or port ranges to scan (e.g. 22,80,443 or 1-1000).
ScanType String No -sT Nmap scan technique. Allowed values: -sT, -sS, -sU, -sA, -sN, -sF, -sX.
ServiceDetection Switch No false Enables service and version detection (-sV).
OsDetection Switch No false Enables operating system detection (-O).
Timing Integer No 3 Nmap timing template (-T0 to -T5). Higher values increase speed and noise.
Timeout Integer No 600 Maximum execution time in seconds before the command is terminated.

Notes

  • The scan is executed with host discovery disabled (-Pn).
  • Raw standard output is returned on success; raw standard error is returned on failure.
  • Certain scan types (e.g. -sS, -sU, -O) may require elevated privileges on the target system.
  • Large CIDR ranges or slow UDP scans may require increased timeout values to complete.
  • When multiple targets are specified, they may be scanned within a single nmap invocation, resulting in interleaved per-host output.
Scroll to Top