arms:nmap
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
arms:nmap [2024/06/07 07:22] – Humphrey Boa-Gart | arms:nmap [2024/08/06 05:48] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Nmap ====== | ====== Nmap ====== | ||
- | **Nmap** (**N**etwork **Map**per) is a command-line //port scanner//. It identifies which services | + | **Nmap** (**N**etwork **Map**per) is a cross-platform |
+ | |||
+ | Nmap isn't limited to just scanning for open ports. It also features such abilities as host discovery, service and operating system detection, version identification, | ||
+ | |||
+ | **Note:** Port scanning is a fast way to get your IP address flagged by some hosts. For best results, pair this with a [[security: | ||
===== Download Nmap ===== | ===== Download Nmap ===== | ||
Line 7: | Line 11: | ||
Nmap is available for Linux, Windows, BSD & MacOS. Download options for all platforms can be [[https:// | Nmap is available for Linux, Windows, BSD & MacOS. Download options for all platforms can be [[https:// | ||
- | === Debian/ | + | ==== Debian/ |
$ sudo apt install nmap | $ sudo apt install nmap | ||
- | === Fedora/Red Hat === | + | ==== Fedora/Red Hat ==== |
$ sudo dnf install nmap | $ sudo dnf install nmap | ||
- | === Windows === | + | ==== Windows |
Read the [[https:// | Read the [[https:// | ||
- | === MacOS === | + | ==== MacOS ==== |
Read the [[https:// | Read the [[https:// | ||
- | ==== Zenmap | + | ===== Basic Usage ===== |
- | There is a GUI version of Nmap called | + | For this article, we will be using Nmap.org' |
- | ===== Example Commands ===== | + | For basic usage, just run '' |
- | Basic usage (see which ports are open/ | + | $ nmap scanme.nmap.org |
- | | + | You can run it against IP addresses too. A '' |
- | Identify services running on one computer: | + | $ nmap 45.33.32.156 |
- | nmap -sV 192.168.1.150 | + | ==== Host Discovery ==== |
- | Identify services running on one computer, which does not respond to pings: | + | The first part of an Nmap scan is host discovery. To see if the host will even respond to Nmap in the first place, without waiting for a whole port scan that typically comes after, use the '' |
- | nmap -sV -PN 192.168.1.150 | + | |
- | Check to see if specific ports are open on one computer: | + | Sometimes a host may not respond |
- | nmap -p T:21-25,80,443 192.168.1.150 | + | |
+ | $ nmap -PN scanme.nmap.org | ||
+ | $ nmap -PR scanme.nmap.org | ||
+ | |||
+ | Etc, etc, etc. Flags can be combined sequentially like so: | ||
+ | |||
+ | $ nmap -PN -sP scanme.nmap.org | ||
- | Check to see if specific ports are open on a range of computers: | + | If your target is not responding |
- | | + | ==== Port Scanning ==== |
+ | |||
+ | To skip host discovery and go straight to the port scan, use the '' | ||
+ | |||
+ | $ nmap -Pn scanme.nmap.org | ||
+ | |||
+ | Check to see if specific ports are open on one address: | ||
+ | |||
+ | $ nmap -p T: | ||
+ | |||
+ | Check to see if specific ports are open on a range of addresses: | ||
+ | |||
+ | $ nmap -p T: | ||
+ | |||
+ | ==== Service & Version Identification ==== | ||
+ | |||
+ | Identify information about services running on a host with the '' | ||
+ | |||
+ | $ nmap -sV scanme.nmap.org | ||
+ | |||
+ | ==== OS Identification ==== | ||
+ | |||
+ | Identify the operating system of a host with the '' | ||
+ | |||
+ | $ nmap -O scanme.nmap.org | ||
+ | |||
+ | |||
+ | ===== Zenmap ===== | ||
+ | |||
+ | There is a GUI version of Nmap called [[https:// | ||
===== More Info ===== | ===== More Info ===== | ||
- | [[https:// | + | [[https:// |
+ | |||
+ | [[https:// | ||
[[http:// | [[http:// | ||
{{tag> | {{tag> |
arms/nmap.1717744923.txt.gz · Last modified: 2024/08/06 05:53 (external edit)
Find this page online at: https://bestpoint.institute/arms/nmap
Find this page online at: https://bestpoint.institute/arms/nmap