arms:nmap
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
arms:nmap [2024/06/03 09:07] – [More Info] Humphrey Boa-Gart | arms:nmap [2024/08/06 05:48] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | {{wst> | ||
- | |||
====== Nmap ====== | ====== Nmap ====== | ||
- | **Nmap (Network Mapper)** is a port scanner. It identifies which services | + | **Nmap** (**N**etwork **Map**per) |
- | The GUI version of Nmap is called Zenmap. | + | Nmap isn't limited to just scanning for open ports. It also features such abilities as host discovery, service and operating system detection, version identification, |
- | ===== Example Commands ===== | + | **Note:** Port scanning is a fast way to get your IP address flagged by some hosts. For best results, pair this with a [[security: |
- | Basic usage (see which ports are open/ | + | ===== Download Nmap ===== |
- | | + | Nmap is available for Linux, Windows, BSD & MacOS. Download options for all platforms can be [[https://nmap.org/ |
- | Identify services running on one computer: | + | ==== Debian/ |
- | nmap -sV 192.168.1.150 | + | |
- | Identify services running on one computer, which does not respond to pings: | + | ==== Fedora/Red Hat ==== |
- | nmap -sV -PN 192.168.1.150 | + | |
- | Check to see if specific ports are open on one computer: | + | ==== Windows ==== |
- | | + | Read the [[https://nmap.org/ |
- | Check to see if specific ports are open on a range of computers: | + | ==== MacOS ==== |
- | | + | Read the [[https:// |
+ | |||
+ | ===== Basic Usage ===== | ||
+ | |||
+ | For this article, we will be using Nmap.org' | ||
+ | |||
+ | For basic usage, just run '' | ||
+ | |||
+ | $ nmap scanme.nmap.org | ||
+ | |||
+ | You can run it against IP addresses too. A '' | ||
+ | |||
+ | $ nmap 45.33.32.156 | ||
+ | |||
+ | ==== Host Discovery ==== | ||
+ | |||
+ | The first part of an Nmap scan is host discovery. To see if the host will even respond to Nmap in the first place, without waiting for a whole port scan that typically comes after, use the '' | ||
+ | |||
+ | $ nmap -sP scanme.nmap.org | ||
+ | |||
+ | Sometimes a host may not respond to a standard ping. There are a multitude of '' | ||
+ | |||
+ | $ nmap -PA scanme.nmap.org | ||
+ | $ nmap -PN scanme.nmap.org | ||
+ | $ nmap -PR scanme.nmap.org | ||
+ | |||
+ | Etc, etc, etc. Flags can be combined sequentially like so: | ||
+ | |||
+ | $ nmap -PN -sP scanme.nmap.org | ||
+ | |||
+ | If your target is not responding to pings, try adding one of these flags to your command and see if that does the trick. For more information, | ||
+ | |||
+ | ==== Port Scanning ==== | ||
+ | |||
+ | To skip host discovery and go straight to the port scan, use the '' | ||
+ | |||
+ | $ nmap -Pn scanme.nmap.org | ||
+ | |||
+ | Check to see if specific ports are open on one address: | ||
+ | |||
+ | $ nmap -p T: | ||
+ | |||
+ | Check to see if specific ports are open on a range of addresses: | ||
+ | |||
+ | $ nmap -p T: | ||
+ | |||
+ | ==== Service & Version Identification ==== | ||
+ | |||
+ | Identify information about services running on a host with the '' | ||
+ | |||
+ | $ nmap -sV scanme.nmap.org | ||
+ | |||
+ | ==== OS Identification ==== | ||
+ | |||
+ | Identify the operating system of a host with the '' | ||
+ | |||
+ | $ nmap -O scanme.nmap.org | ||
+ | |||
+ | |||
+ | ===== Zenmap ===== | ||
+ | |||
+ | There is a GUI version of Nmap called [[https:// | ||
===== More Info ===== | ===== More Info ===== | ||
- | [[https://insecure.org/|Nmap homepage]] | + | [[https://nmap.org|Nmap |
- | [[http://linux.die.net/man/1/nmap|Nmap Man page]] | + | [[https://nmap.org/book/toc.html|Nmap User Manual]] |
- | [[wp>Nmap]] | + | [[http:// |
- | {{tag> | + | {{tag> |
arms/nmap.1717405650.txt.gz · Last modified: 2024/08/06 05:52 (external edit)
Find this page online at: https://bestpoint.institute/arms/nmap
Find this page online at: https://bestpoint.institute/arms/nmap