Difference between revisions of "Nmap"

From wikieduonline
Jump to navigation Jump to search
Line 34: Line 34:
 
* [[MASSCAN]]
 
* [[MASSCAN]]
 
* {{whois}}
 
* {{whois}}
 
==External Links==
 
* Nmap map page: https://linux.die.net/man/1/nmap
 
*[http://insecure.org/nmap/man/ Official <code>nmap</code> manual]
 
  
  

Revision as of 15:00, 4 January 2020

Nmap (Network Mapper) is a security scanner that can be used to discover hosts and services on a computer or computer network. Includes at least nmap and nping binaries.

Basic nmap commands

  • Basic nmap host scan:
    • nmap -nP HOSTNAME_TO_SCAN
    • nmap -nP HOSTNAME_TO_SCAN -p 80,443
    • nmap HOSTNAME_TO_SCAN
  • Basic nmap network scan: nmap -sn 192.168.0.* (-sn - ping scan so No/disable port scan)
-sn: Ping scan so disable port scan
  • OS detection: nmap -O IP

Basic nping commands

nping is packet generation, response analysis and response time measurement available since 2011 and developed by nmap developers

  • "TCP ping":
    • nping -c 1 --tcp -p 80,433 google.com[1]
    • nping -c 3 --tcp -p 443 --flags syn google.com[2]
  • nping -H -tr 8.8.8.8 (-H Hide-sent do not display sent packets, -tr traceroute)

Activities

Basic

  1. Use nping to execute a "tcp ping": Check TCP connectivity

Advanced

  1. Read nmap Changelog: https://nmap.org/changelog.html

See also

  • https://nmap.org/book/nping-man.html
  • https://www.aldeid.com/wiki/Nping
  • https://serverfault.com/a/608976
  • Advertising: