This nmap command will attempt to determine the operating system, services, and versions running on the target device. It will also run a set of default scripts against the target to gather more information.
# Perform a thorough network scan with nmap
This scan will attempt to determine the operating system, services, and versions running on the target device. It will also run a set of default scripts against the target to gather more information.
```sh
nmap -p 1-65535 -sV -sC -O -A -T4 <target-ip>
```
**NOTE:** This command requires sudo, and takes quite a while to complete, even on a single target. 10-20 minutes (per target) is not uncommon.
## Options
- `-p 1-65535`: **Port Range Specification**: Scans all 65535 ports, instead of the default top 1000 ports.
- `-sV`: **Service Version Detection**: Attempts to determine the version of the services running on open ports.
- `-sC`: **Script Scanning**: Runs a set of default scripts against the target to gather more information.
- `-O`: **Operating System Detection**: Attempts to determine the operating system of the target device.
- `-A`: **Aggressive Scan**: Combines OS detection, version detection, script scanning, and traceroute for a comprehensive scan.
- `-T4`: **Timing Template**: Sets the timing template to "aggressive" to speed up the scan.