Network Scan Using Nmap

Welcome to the cyber world!

Step 1: Nmap Introduction

Nmap is an open-source command-line tool commonly used on Linux systems to scan IP addresses, domain names, and ports within a network. It's designed to detect and identify installed services on target systems. Nmap allows security teams to identify devices operating within their targeted network, discover open ports and associated services, and even detect the presence of specific operating systems, intrusion prevention systems (IPS), and intrusion detection systems (IDS). Nmap is a preinstalled scanning tool on Kali Linux. It is widely regarded as one of the best open-source network scanning tools available. Alternatively, Nmap have a GUI-based network scanning tool called Zenmap.

Step 2: Key Features of Nmap

Host Discovery:

Explain how Nmap can be used to discover active hosts on a network.

Port Scanning:

Discuss different port scanning techniques, such as TCP SYN scan, UDP scan, and TCP connect scan.

Service Detection:

Explain how Nmap can identify services running on open ports.

OS Fingerprinting:

Describe how Nmap can determine the operating system of target hosts.

Scripting Engine:

Highlight Nmap's scripting engine (NSE) and its use in automating tasks and performing advanced scans.

Step 3: Nmap Setup

You can download Nmap by clicking the 'Download' button. Additionally, please remember to select the appropriate version for Windows, Mac or Linux. Linux Installation : To installl .deb package use "sudo dpkg -i packagename.deb", or install .rpm package use "sudo rpm -i package_name.rpm". Windows Installation: Normal Installation (Next, Next, Install, etc..).

Step 4: Nmap Commands

Command Detailed Ovrerview
nmap -sS 192.168.1.0/24 [-sS, -Pn] -Discover all the hosts, ports and services insite the network [TCP SYN scan]
nmap -p 80, 22, 21 [IP Address] [-p] -Only scan for the specific port of the host
nmap -v -version-all [IP Address] [-v] -Discover all the services on verbose mode it will show all the actual steps happening in background
nmap -v -O 192.168.1.210 [-O] -Detect the OS running on the host
nmap -v -T5 -O [IP Address] [T1-5] -is used to reduce the scan time
nmap -v -O [IP Address] -o scan.txt [-o] -Save the output file
nmap -sV [IP Address] [-sV] -It will detect the services version
nmap -p445 --script smb-protocols [IP Address] [-script smb-protocols] -Script scan for the specific protocol
nmap -A [IP Address] [-A] - Would be the full scan