arms:nmap
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
arms:nmap [2024/06/07 08:00] – Humphrey Boa-Gart | arms:nmap [2024/08/06 05:48] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Nmap ====== | ====== Nmap ====== | ||
- | **Nmap** (**N**etwork **Map**per) is a cross-platform command-line //port scanner//. It identifies which ports are open on a networked computer, which in turn can help identify what services are running on that computer. This is useful to both sysadmins and hackers alike for discovering potential | + | **Nmap** (**N**etwork **Map**per) is a cross-platform command-line //port scanner//. It identifies which ports are open on a networked computer, which in turn can help identify what services are running on that computer. This is useful to both sysadmins and hackers alike for discovering potential |
- | Nmap isn't limited to just scanning for open ports, but features such abilities as host discovery, service and operating system detection, version identification, | + | Nmap isn't limited to just scanning for open ports. It also features such abilities as host discovery, service and operating system detection, version identification, |
+ | |||
+ | **Note:** Port scanning is a fast way to get your IP address flagged by some hosts. For best results, pair this with a [[security: | ||
===== Download Nmap ===== | ===== Download Nmap ===== | ||
Line 33: | Line 35: | ||
$ nmap scanme.nmap.org | $ nmap scanme.nmap.org | ||
- | You can run it against IP addresses too. A '' | + | You can run it against IP addresses too. A '' |
$ nmap 45.33.32.156 | $ nmap 45.33.32.156 | ||
Line 45: | Line 47: | ||
Sometimes a host may not respond to a standard ping. There are a multitude of '' | Sometimes a host may not respond to a standard ping. There are a multitude of '' | ||
- | $ nmap -PR -sP scanme.nmap.org | + | $ nmap -PA scanme.nmap.org |
- | $ nmap -PA -sP scanme.nmap.org | + | $ nmap -PN scanme.nmap.org |
+ | $ nmap -PR scanme.nmap.org | ||
| | ||
- | | + | Etc, etc, etc. Flags can be combined sequentially like so: |
+ | |||
+ | $ nmap -PN -sP scanme.nmap.org | ||
- | For more information, | + | If your target is not responding to pings, try adding one of these flags to your command and see if that does the trick. |
==== Port Scanning ==== | ==== Port Scanning ==== | ||
Line 66: | Line 71: | ||
$ nmap -p T: | $ nmap -p T: | ||
- | ==== Service Identification ==== | + | ==== Service |
- | Identify services running on a host: | + | Identify |
$ nmap -sV scanme.nmap.org | $ nmap -sV scanme.nmap.org | ||
- | Identify | + | ==== OS Identification ==== |
+ | |||
+ | Identify | ||
+ | |||
+ | $ nmap -O scanme.nmap.org | ||
- | $ nmap -sV -PN scanme.nmap.org | ||
===== Zenmap ===== | ===== Zenmap ===== | ||
Line 82: | Line 90: | ||
===== More Info ===== | ===== More Info ===== | ||
- | [[https:// | + | [[https:// |
+ | |||
+ | [[https:// | ||
[[http:// | [[http:// | ||
{{tag> | {{tag> |
arms/nmap.1717747217.txt.gz · Last modified: 2024/08/06 05:52 (external edit)
Find this page online at: https://bestpoint.institute/arms/nmap
Find this page online at: https://bestpoint.institute/arms/nmap