This is an old revision of the document!
Table of Contents
This article was imported from the 2011 Insurgency Wiki backup, and sits here in its original crude format. It is in dire need of modernization and cleanup.
Nmap
Nmap (Network Mapper) is a port scanner. It identifies which services are running on a networked computer. This is useful for discovering and identifying points of attack in potential targets. Its ability to scan entire networks is very useful when combined with Whois information about organizations you may be targeting.
The GUI version of Nmap is called Zenmap.
Example Commands
Basic usage (see which ports are open/filtered/closed):
nmap 192.168.1.150
Identify services running on one computer:
nmap -sV 192.168.1.150
Identify services running on one computer, which does not respond to pings:
nmap -sV -PN 192.168.1.150
Check to see if specific ports are open on one computer:
nmap -p T:21-25,80,443 192.168.1.150
Check to see if specific ports are open on a range of computers:
nmap -p T:21-25,80,443 192.168.1.150-254
More Info
Find this page online at: https://bestpoint.institute/arms/nmap