Editing Nmap
Jump to navigation
Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
− | + | <code>'''[[wikipedia:Nmap|Nmap]]'''</code> (''Network Mapper'') is a security [[Network scanner|scanner]] that can be used to discover [[Host (network)|hosts]] and [[Web service|services]] on a computer or [[computer network]]. Includes at least nmap and nping binaries. | |
− | <code>'''[[wikipedia:Nmap| | ||
− | |||
− | |||
− | |||
− | |||
== Basic nmap commands == | == Basic nmap commands == | ||
− | + | * Basic nmap host scan: | |
− | * Basic nmap | + | **<code>nmap -nP HOSTNAME_TO_SCAN</code> |
− | **<code>nmap - | + | **<code>nmap -nP HOSTNAME_TO_SCAN -p 80,443</code> |
− | **<code>nmap - | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
**<code>nmap HOSTNAME_TO_SCAN</code> | **<code>nmap HOSTNAME_TO_SCAN</code> | ||
+ | * Basic nmap network scan: <code>nmap -sn 192.168.0.*</code> (-sn - ping scan so No/disable port scan) | ||
+ | :<code>-sn: Ping scan so disable port scan</code> | ||
− | + | * [[OS]] detection: <code>nmap -O IP</code> | |
− | + | * -sP TODO | |
− | |||
− | |||
− | |||
− | |||
− | * [[OS]] detection | ||
− | |||
− | |||
− | * | ||
== Basic nping commands == | == Basic nping commands == | ||
Line 38: | Line 19: | ||
* <code>nping -H -tr 8.8.8.8</code> (-H Hide-sent do not display sent packets, -tr traceroute) | * <code>nping -H -tr 8.8.8.8</code> (-H Hide-sent do not display sent packets, -tr traceroute) | ||
− | = | + | ===Banner Grabbing== |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | ==Banner Grabbing== | ||
− | |||
− | + | <code>nmap -sV --version-intensity 5 godaddy.com -p 80</code> | |
− | The | + | The -sV option lets us fetch the software versions, and by adding –version-intensity 5, we can get the maximum number of possible details about the remote running software. |
By using the powerful NSE we can also try other scripts that will help us fetch remote banners easily: | By using the powerful NSE we can also try other scripts that will help us fetch remote banners easily: | ||
− | + | <code>nmap -sV --script=banner IP</code> | |
== Activities == | == Activities == | ||
Line 71: | Line 35: | ||
=== Advanced === | === Advanced === | ||
# Read [[nmap Changelog]]: https://nmap.org/changelog.html | # Read [[nmap Changelog]]: https://nmap.org/changelog.html | ||
− | |||
− | |||
− | |||
− | |||
==See also== | ==See also== | ||
* {{nmap}} | * {{nmap}} | ||
− | |||
* [[Wikibooks:Hacking/Tools/Network/Nmap]] | * [[Wikibooks:Hacking/Tools/Network/Nmap]] | ||
* {{ping}} | * {{ping}} |
Advertising: