Difference between revisions of "Nmap"

From wikieduonline
Jump to navigation Jump to search
Tags: Mobile web edit, Mobile edit
Line 18: Line 18:
 
** <code>nping -c 3 --tcp -p 443 --flags syn google.com</code><ref>https://www.aldeid.com/wiki/Nping</ref>
 
** <code>nping -c 3 --tcp -p 443 --flags syn google.com</code><ref>https://www.aldeid.com/wiki/Nping</ref>
 
* <code>nping -H -tr 8.8.8.8</code> (-H Hide-sent do not display sent packets, -tr traceroute)
 
* <code>nping -H -tr 8.8.8.8</code> (-H Hide-sent do not display sent packets, -tr traceroute)
 +
 +
===Banner Grabbing==
 +
 +
<code>nmap -sV --version-intensity 5 godaddy.com -p 80</code>
 +
 +
The -sV option lets us fetch the software versions, and by adding –version-intensity 5, we can get the maximum number of possible details about the remote running software.
 +
 +
By using the powerful NSE we can also try other scripts that will help us fetch remote banners easily:
 +
 +
<code>nmap -sV --script=banner IP</code>
  
 
== Activities ==
 
== Activities ==

Revision as of 07:03, 5 April 2020

Nmap (Network Mapper) is a security scanner that can be used to discover hosts and services on a computer or computer network. Includes at least nmap and nping binaries.

Basic nmap commands

  • Basic nmap host scan:
    • nmap -nP HOSTNAME_TO_SCAN
    • nmap -nP HOSTNAME_TO_SCAN -p 80,443
    • nmap HOSTNAME_TO_SCAN
  • Basic nmap network scan: nmap -sn 192.168.0.* (-sn - ping scan so No/disable port scan)
-sn: Ping scan so disable port scan
  • OS detection: nmap -O IP
  • -sP TODO

Basic nping commands

nping is packet generation, response analysis and response time measurement available since 2011 and developed by nmap developers

  • "TCP ping":
    • nping -c 1 --tcp -p 80,433 google.com[1]
    • nping -c 3 --tcp -p 443 --flags syn google.com[2]
  • nping -H -tr 8.8.8.8 (-H Hide-sent do not display sent packets, -tr traceroute)

=Banner Grabbing

nmap -sV --version-intensity 5 godaddy.com -p 80

The -sV option lets us fetch the software versions, and by adding –version-intensity 5, we can get the maximum number of possible details about the remote running software.

By using the powerful NSE we can also try other scripts that will help us fetch remote banners easily:

nmap -sV --script=banner IP

Activities

Basic

  1. Use nping to execute a "tcp ping": Check TCP connectivity

Advanced

  1. Read nmap Changelog: https://nmap.org/changelog.html

See also

  • https://nmap.org/book/nping-man.html
  • https://www.aldeid.com/wiki/Nping
  • https://serverfault.com/a/608976
  • Advertising: