User Tools

Site Tools

arms:nmap

This is an old revision of the document!


Table of Contents

This article was imported from the 2011 Insurgency Wiki backup, and sits here in its original crude format. It is in dire need of modernization and cleanup.

Nmap

Nmap (Network Mapper) is a port scanner. It identifies which services are running on a networked computer. This is useful for discovering and identifying points of attack in potential targets. Its ability to scan entire networks is very useful when combined with Whois information about organizations you may be targeting.

The GUI version of Nmap is called Zenmap.

Example Commands

Basic usage (see which ports are open/filtered/closed):

nmap 192.168.1.150

Identify services running on one computer:

nmap -sV 192.168.1.150

Identify services running on one computer, which does not respond to pings:

nmap -sV -PN 192.168.1.150

Check to see if specific ports are open on one computer:

nmap -p T:21-25,80,443 192.168.1.150

Check to see if specific ports are open on a range of computers:

nmap -p T:21-25,80,443 192.168.1.150-254

More Info

arms/nmap.1717405670.txt.gz ยท Last modified: 2024/08/06 05:53 (external edit)

Find this page online at: https://bestpoint.institute/arms/nmap