NMAP for Windows: Download, Installation, Configuration and Top 30 Commands (2016 version)

Nmap has adopted to Windows quite a while ago. The Windows version allows the user to operate the tool via the graphical user interface, it also allows the users to send direct commands to the network scanner tool.

In this guide, we are going to take a look at how to download, install and configure the tool on your Windows operating system.

We will also provide a huge list that holds commands that might be usefull.

Download and Installation of NMAP for Windows

In order to install the tool on Windows, you will need to have the official package. The Windows package has been renamed to Zenmap. Zenmap is the cross platform name of the NMAP tool.

The official site were you can find the download is:

The direct location to download the Zenmap (NMAP) Network scanner:


  • Download the Zenmap executable from the official source
  • Double click on the downloaded Zenmap file
  • Follow the installation instructions that have been provided in the screen
  • Install additional software if the installer requests you to do so

Configuration of NMAP

nmap windows configuration
nmap windows configuration

Zenmap does not need configuration at start. It is a plug-and-play tool that allows you to perform network scans within seconds.

If you have a desire to configure your tool to suite your demands, then I strongly advice you to take a look at the official documentation which you can find at the official nmap.org site.

Scan a single IP nmap
Scan a host nmap google.com
Scan a range of IPs nmap
Scan a subnet nmap
Scan targets from a text file nmap -iL list-of-ips.txt
Scan a single Port nmap -p 22
Scan a range of ports nmap -p 1-100
Scan 100 most common ports (Fast) nmap -F
Scan all 65535 ports nmap -p-
Scan using TCP connect nmap -sT
Scan using TCP SYN scan (default) nmap -sS
Scan UDP ports nmap -sU -p 123,161,162
Scan selected ports – ignore discovery nmap -Pn -F
Detect OS and Services nmap -A
Standard service detection nmap -sV
More aggressive Service Detection nmap -sV –version-intensity 5
Lighter banner grabbing detection nmap -sV –version-intensity 0
Save default output to file nmap -oN outputfile.txt
Save results as XML nmap -oX outputfile.xml
Save results in a format for grep nmap -oG outputfile.txt
Save in all formats nmap -oA outputfile
Scan using default safe scripts nmap -sV -sC
Get help for a script nmap –script-help=ssl-heartbleed
Scan using a specific NSE script nmap -sV -p 443 –script=ssl-heartbleed.nse
Scan with a set of scripts nmap -sV –script=smb*
Scan for UDP DDOS reflectors nmap –sU –A –PN –n –pU:19,53,123,161 –script=ntp-monlist,dns-recursion,snmp-sysdescr
Gather page titles from HTTP services nmap –script=http-title
Get HTTP headers of web services nmap –script=http-headers
Find web apps from known paths nmap –script=http-enum
Heartbleed Testing nmap -sV -p 443 –script=ssl-heartbleed
Find Information about IP address nmap –script=asn-query,whois,ip-geolocation-maxmind
Scan a host name with more info nmap -v mail.google.com
Share this information

Related Posts