Network Scan Using Nmap
Welcome to the cyber world!
Step 1: Nmap Introduction
Nmap is an open-source command-line tool commonly used on Linux systems to scan IP addresses, domain names, and ports within a network. It's designed to detect and identify installed services on target systems. Nmap allows security teams to identify devices operating within their targeted network, discover open ports and associated services, and even detect the presence of specific operating systems, intrusion prevention systems (IPS), and intrusion detection systems (IDS). Nmap is a preinstalled scanning tool on Kali Linux. It is widely regarded as one of the best open-source network scanning tools available. Alternatively, Nmap have a GUI-based network scanning tool called Zenmap.
Step 2: Key Features of Nmap
Host Discovery:
Explain how Nmap can be used to discover active hosts on a network.
Port Scanning:
Discuss different port scanning techniques, such as TCP SYN scan, UDP scan, and TCP connect scan.
Service Detection:
Explain how Nmap can identify services running on open ports.
OS Fingerprinting:
Describe how Nmap can determine the operating system of target hosts.
Scripting Engine:
Highlight Nmap's scripting engine (NSE) and its use in automating tasks and performing advanced scans.
Step 3: Nmap Setup
You can download Nmap by clicking the 'Download' button. Additionally, please remember to select the appropriate version for Windows, Mac or Linux. Linux Installation : To installl .deb package use "sudo dpkg -i packagename.deb", or install .rpm package use "sudo rpm -i package_name.rpm". Windows Installation: Normal Installation (Next, Next, Install, etc..).
Step 4: Nmap Commands
Command | Detailed Ovrerview |
---|---|
nmap -sS 192.168.1.0/24 | [-sS, -Pn] -Discover all the hosts, ports and services insite the network [TCP SYN scan] |
nmap -p 80, 22, 21 [IP Address] | [-p] -Only scan for the specific port of the host |
nmap -v -version-all [IP Address] | [-v] -Discover all the services on verbose mode it will show all the actual steps happening in background |
nmap -v -O 192.168.1.210 | [-O] -Detect the OS running on the host |
nmap -v -T5 -O [IP Address] | [T1-5] -is used to reduce the scan time |
nmap -v -O [IP Address] -o scan.txt | [-o] -Save the output file |
nmap -sV [IP Address] | [-sV] -It will detect the services version |
nmap -p445 --script smb-protocols [IP Address] | [-script smb-protocols] -Script scan for the specific protocol |
nmap -A [IP Address] | [-A] - Would be the full scan |