Difference between revisions of "Nmap"

From wikieduonline
Jump to navigation Jump to search
Line 31: Line 31:
 
* {{fail2ban}}
 
* {{fail2ban}}
 
* [[MASSCAN]]
 
* [[MASSCAN]]
 +
* {{whois}}
  
 
==External Links==
 
==External Links==

Revision as of 11:38, 29 December 2019

Nmap (Network Mapper) is a security scanner that can be used to discover hosts and services on a computer or computer network. Includes at least nmap and nping binaries.

Basic nmap commands

  • Basic nmap host scan:
    • nmap -nP HOSTNAME_TO_SCAN
    • nmap -nP HOSTNAME_TO_SCAN -p 80,443
    • nmap HOSTNAME_TO_SCAN
  • Basic nmap network scan: nmap -sn 192.168.0.* (-sn - ping scan so No/disable port scan)
-sn: Ping scan so disable port scan

Basic nping commands

nping is packet generation, response analysis and response time measurement available since 2011 and developed by nmap developers

  • "TCP ping":
    • nping -c 1 --tcp -p 80,433 google.com[1]
    • nping -c 3 --tcp -p 443 --flags syn google.com[2]
  • nping -H -tr 8.8.8.8 (-H Hide-sent do not display sent packets, -tr traceroute)

Activities

Basic

  1. Use nping to execute a "tcp ping": Check TCP connectivity

Advanced

  1. Read /nmap Changelog/: https://nmap.org/changelog.html

See also

External Links

  • https://nmap.org/book/nping-man.html
  • https://www.aldeid.com/wiki/Nping
  • https://serverfault.com/a/608976
  • Advertising: