arms:nmap
Differences
This shows you the differences between two versions of the page.
| Next revision | Previous revision | ||
| arms:nmap [2024/06/03 08:58] – created Humphrey Boa-Gart | arms:nmap [2025/09/30 22:44] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | {{wst> | ||
| - | |||
| ====== Nmap ====== | ====== Nmap ====== | ||
| - | **Nmap (Network Mapper)** is a port scanner. It identifies which services | + | **Nmap** (**N**etwork **Map**per) |
| - | The GUI version of Nmap is called Zenmap. | + | Nmap isn't limited to just scanning for open ports. It also features such abilities as host discovery, service and operating system detection, version identification, |
| - | ===== Example Commands ===== | + | **Note:** Port scanning is a fast way to get your IP address flagged by some hosts. For best results, pair this with a [[security: |
| - | Basic usage (see which ports are open/ | + | ===== Download Nmap ===== |
| - | | + | Nmap is available for Linux, Windows, BSD & MacOS. Download options for all platforms can be [[https://nmap.org/ |
| - | Identify services running on one computer: | + | ==== Debian/ |
| - | nmap -sV 192.168.1.150 | + | |
| - | Identify services running on one computer, which does not respond to pings: | + | ==== Fedora/Red Hat ==== |
| - | nmap -sV -PN 192.168.1.150 | + | |
| - | Check to see if specific ports are open on one computer: | + | ==== Windows ==== |
| - | | + | Read the [[https://nmap.org/ |
| - | Check to see if specific ports are open on a range of computers: | + | ==== MacOS ==== |
| - | | + | Read the [[https:// |
| + | |||
| + | ===== Basic Usage ===== | ||
| + | |||
| + | For this article, we will be using Nmap.org' | ||
| + | |||
| + | For basic usage, just run '' | ||
| + | |||
| + | $ nmap scanme.nmap.org | ||
| + | |||
| + | You can run it against IP addresses too. A '' | ||
| + | |||
| + | $ nmap 45.33.32.156 | ||
| + | |||
| + | ==== Host Discovery ==== | ||
| + | |||
| + | The first part of an Nmap scan is host discovery. To see if the host will even respond to Nmap in the first place, without waiting for a whole port scan that typically comes after, use the '' | ||
| + | |||
| + | $ nmap -sP scanme.nmap.org | ||
| + | |||
| + | Sometimes a host may not respond to a standard ping. There are a multitude of '' | ||
| + | |||
| + | $ nmap -PA scanme.nmap.org | ||
| + | $ nmap -PN scanme.nmap.org | ||
| + | $ nmap -PR scanme.nmap.org | ||
| + | |||
| + | Etc, etc, etc. Flags can be combined sequentially like so: | ||
| + | |||
| + | $ nmap -PN -sP scanme.nmap.org | ||
| + | |||
| + | If your target is not responding to pings, try adding one of these flags to your command and see if that does the trick. For more information, | ||
| + | |||
| + | ==== Port Scanning ==== | ||
| + | |||
| + | To skip host discovery and go straight to the port scan, use the '' | ||
| + | |||
| + | $ nmap -Pn scanme.nmap.org | ||
| + | |||
| + | Check to see if specific ports are open on one address: | ||
| + | |||
| + | $ nmap -p T: | ||
| + | |||
| + | Check to see if specific ports are open on a range of addresses: | ||
| + | |||
| + | $ nmap -p T: | ||
| + | |||
| + | ==== Service & Version Identification ==== | ||
| + | |||
| + | Identify information about services running on a host with the '' | ||
| + | |||
| + | $ nmap -sV scanme.nmap.org | ||
| + | |||
| + | ==== OS Identification ==== | ||
| + | |||
| + | Identify the operating system of a host with the '' | ||
| + | |||
| + | $ nmap -O scanme.nmap.org | ||
| + | |||
| + | |||
| + | ===== Zenmap ===== | ||
| + | |||
| + | There is a GUI version of Nmap called [[https:// | ||
| ===== More Info ===== | ===== More Info ===== | ||
| - | [[https://insecure.org/|Nmap homepage]] | + | [[https://nmap.org|Nmap |
| - | [[http://linux.die.net/man/1/nmap|Nmap Man page]] | + | [[https://nmap.org/book/toc.html|Nmap User Manual]] |
| + | [[http:// | ||
| - | {{tag> | + | {{tag> |
arms/nmap.1717405090.txt.gz · Last modified: (external edit)
Find this page online at: https://bestpoint.institute/arms/nmap
Find this page online at: https://bestpoint.institute/arms/nmap

