arms:nmap
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| arms:nmap [2024/06/07 08:19] – [Nmap] Humphrey Boa-Gart | arms:nmap [2025/12/02 03:22] (current) – removed Humphrey Boa-Gart | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== Nmap ====== | ||
| - | **Nmap** (**N**etwork **Map**per) is a cross-platform command-line //port scanner//. It identifies which ports are open on a networked computer, which in turn can help identify what services are running on that computer. This is useful to both sysadmins and hackers alike for discovering potential points of attack in prospective targets. Its ability to scan entire networks is very useful when combined with [[tools: | ||
| - | |||
| - | Nmap isn't limited to just scanning for open ports, but features such abilities as host discovery, service and operating system detection, version identification, | ||
| - | |||
| - | **Note:** Port scanning is a fast way to get your IP address flagged by some hosts. For best results, pair this with a [[security: | ||
| - | |||
| - | ===== Download Nmap ===== | ||
| - | |||
| - | Nmap is available for Linux, Windows, BSD & MacOS. Download options for all platforms can be [[https:// | ||
| - | |||
| - | ==== Debian/ | ||
| - | |||
| - | $ sudo apt install nmap | ||
| - | |||
| - | ==== Fedora/Red Hat ==== | ||
| - | |||
| - | $ sudo dnf install nmap | ||
| - | |||
| - | ==== Windows ==== | ||
| - | |||
| - | Read the [[https:// | ||
| - | |||
| - | ==== MacOS ==== | ||
| - | |||
| - | Read the [[https:// | ||
| - | |||
| - | ===== Basic Usage ===== | ||
| - | |||
| - | For this article, we will be using Nmap.org' | ||
| - | |||
| - | For basic usage, just run '' | ||
| - | |||
| - | $ nmap scanme.nmap.org | ||
| - | |||
| - | You can run it against IP addresses too. A '' | ||
| - | |||
| - | $ nmap 45.33.32.156 | ||
| - | |||
| - | ==== Host Discovery ==== | ||
| - | |||
| - | The first part of an Nmap scan is host discovery. To see if the host will even respond to Nmap in the first place, without waiting for a whole port scan that typically comes after, use the '' | ||
| - | |||
| - | $ nmap -sP scanme.nmap.org | ||
| - | |||
| - | Sometimes a host may not respond to a standard ping. There are a multitude of '' | ||
| - | |||
| - | $ nmap -PA -sP scanme.nmap.org | ||
| - | $ nmap -PN -sP scanme.nmap.org | ||
| - | $ nmap -PR -sP scanme.nmap.org | ||
| - | | ||
| - | etc, etc | ||
| - | |||
| - | If your target is not responding to pings, try adding one of these flags to your command and see if that does the trick. For more information, | ||
| - | |||
| - | ==== Port Scanning ==== | ||
| - | |||
| - | To skip host discovery and go straight to the port scan, use the '' | ||
| - | |||
| - | $ nmap -Pn scanme.nmap.org | ||
| - | |||
| - | Check to see if specific ports are open on one address: | ||
| - | |||
| - | $ nmap -p T: | ||
| - | |||
| - | Check to see if specific ports are open on a range of addresses: | ||
| - | |||
| - | $ nmap -p T: | ||
| - | |||
| - | ==== Service & Version Identification ==== | ||
| - | |||
| - | Identify information about services running on a host: | ||
| - | |||
| - | $ nmap -sV scanme.nmap.org | ||
| - | |||
| - | ==== OS Identification ==== | ||
| - | |||
| - | Identify the operating system of a host: | ||
| - | |||
| - | $ nmap -O scanme.nmap.org | ||
| - | |||
| - | |||
| - | ===== Zenmap ===== | ||
| - | |||
| - | There is a GUI version of Nmap called [[https:// | ||
| - | |||
| - | ===== More Info ===== | ||
| - | |||
| - | [[https:// | ||
| - | |||
| - | [[http:// | ||
| - | |||
| - | {{tag> | ||
arms/nmap.1717748345.txt.gz · Last modified: (external edit)
Find this page online at: https://bestpoint.institute/arms/nmap
Find this page online at: https://bestpoint.institute/arms/nmap