arms:nmap
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
arms:nmap [2024/06/07 07:23] – Humphrey Boa-Gart | arms:nmap [2024/08/06 05:48] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Nmap ====== | ====== Nmap ====== | ||
- | **Nmap** (**N**etwork **Map**per) is a command-line //port scanner//. It identifies which services | + | **Nmap** (**N**etwork **Map**per) is a cross-platform |
+ | |||
+ | Nmap isn't limited to just scanning for open ports. It also features such abilities as host discovery, service and operating system detection, version identification, | ||
+ | |||
+ | **Note:** Port scanning is a fast way to get your IP address flagged by some hosts. For best results, pair this with a [[security: | ||
===== Download Nmap ===== | ===== Download Nmap ===== | ||
Line 23: | Line 27: | ||
Read the [[https:// | Read the [[https:// | ||
- | ===== Example Commands | + | ===== Basic Usage ===== |
- | Basic usage (see which ports are open/filtered/closed): | + | For this article, we will be using Nmap.org' |
- | | + | For basic usage, just run '' |
- | Identify services running on one computer: | + | $ nmap scanme.nmap.org |
- | | + | You can run it against IP addresses too. A '' |
- | Identify services running on one computer, which does not respond to pings: | + | $ nmap 45.33.32.156 |
- | nmap -sV -PN 192.168.1.150 | + | ==== Host Discovery ==== |
- | Check to see if specific ports are open on one computer: | + | The first part of an Nmap scan is host discovery. To see if the host will even respond to Nmap in the first place, without waiting for a whole port scan that typically comes after, use the '' |
- | nmap -p T: | + | |
- | Check to see if specific ports are open on a range of computers: | + | Sometimes a host may not respond to a standard ping. There are a multitude of '' |
+ | |||
+ | $ nmap -PA scanme.nmap.org | ||
+ | $ nmap -PN scanme.nmap.org | ||
+ | $ nmap -PR scanme.nmap.org | ||
+ | |||
+ | Etc, etc, etc. Flags can be combined sequentially like so: | ||
+ | |||
+ | $ nmap -PN -sP scanme.nmap.org | ||
+ | |||
+ | If your target is not responding to pings, try adding one of these flags to your command and see if that does the trick. For more information, | ||
+ | |||
+ | ==== Port Scanning ==== | ||
+ | |||
+ | To skip host discovery and go straight to the port scan, use the '' | ||
+ | |||
+ | $ nmap -Pn scanme.nmap.org | ||
+ | |||
+ | Check to see if specific ports are open on one address: | ||
+ | |||
+ | $ nmap -p T: | ||
+ | |||
+ | Check to see if specific ports are open on a range of addresses: | ||
+ | |||
+ | $ nmap -p T: | ||
+ | |||
+ | ==== Service & Version Identification ==== | ||
+ | |||
+ | Identify information about services running on a host with the '' | ||
+ | |||
+ | $ nmap -sV scanme.nmap.org | ||
+ | |||
+ | ==== OS Identification ==== | ||
+ | |||
+ | Identify the operating system of a host with the '' | ||
+ | |||
+ | $ nmap -O scanme.nmap.org | ||
- | nmap -p T: | ||
===== Zenmap ===== | ===== Zenmap ===== | ||
Line 51: | Line 90: | ||
===== More Info ===== | ===== More Info ===== | ||
- | [[https:// | + | [[https:// |
+ | |||
+ | [[https:// | ||
[[http:// | [[http:// | ||
{{tag> | {{tag> |
arms/nmap.1717744980.txt.gz · Last modified: 2024/08/06 05:53 (external edit)
Find this page online at: https://bestpoint.institute/arms/nmap
Find this page online at: https://bestpoint.institute/arms/nmap