Editing Nmap
Jump to navigation
Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
− | + | <code>'''[[wikipedia:Nmap|Nmap]]'''</code> (''Network Mapper'') is a security [[Network scanner|scanner]] that can be used to discover [[Host (network)|hosts]] and [[Web service|services]] on a computer or [[computer network]]. Includes at least nmap and nping binaries. | |
− | <code>'''[[wikipedia:Nmap| | ||
== Installation == | == Installation == | ||
Line 7: | Line 6: | ||
== Basic nmap commands == | == Basic nmap commands == | ||
− | + | * Basic nmap host scan: | |
− | * Basic nmap | + | **<code>nmap -nP HOSTNAME_TO_SCAN</code> |
− | **<code>nmap - | + | **<code>nmap -nP HOSTNAME_TO_SCAN -p 80,443</code> |
− | **<code>nmap - | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
**<code>nmap HOSTNAME_TO_SCAN</code> | **<code>nmap HOSTNAME_TO_SCAN</code> | ||
+ | * Basic nmap network scan: <code>nmap -sn 192.168.0.*</code> (-sn - ping scan so No/disable port scan) | ||
+ | :<code>-sn: Ping scan so disable port scan</code> | ||
− | + | * [[OS]] detection: <code>nmap -O IP</code> | |
− | + | * -sP TODO | |
− | |||
− | |||
− | |||
− | |||
− | * [[OS]] detection | ||
− | |||
*<code>nmap -A IPAddress</code> equivalent to <code>nmap -sV -sC -O -traceroute IPaddress</code> | *<code>nmap -A IPAddress</code> equivalent to <code>nmap -sV -sC -O -traceroute IPaddress</code> | ||
Line 40: | Line 27: | ||
==Basic port scanning== | ==Basic port scanning== | ||
*Scan common ports | *Scan common ports | ||
− | ::<code>nmap | + | ::<code>nmap –F 192.168.0.1</code> |
− | *Scan all | + | *Scan all ports (1 – 65535) |
− | ::<code>nmap | + | ::<code>nmap –p– 192.168.0.1</code> |
− | *To scan using | + | *To scan using TCP connect |
− | ::<code>nmap | + | ::<code>nmap –sT 192.168.0.1</code> |
− | *To perform the default | + | *To perform the default SYN scan |
− | ::<code>nmap | + | ::<code>nmap –sS 192.168.0.1</code> |
− | *The nmap utility can be used to detect the | + | *The nmap utility can be used to detect the operating system of a particular target |
− | ::<code> | + | ::<code>nmap –A 192.168.0.1</code> |
==Banner Grabbing== | ==Banner Grabbing== | ||
− | |||
− | + | <code>nmap -sV --version-intensity 5 xxxxxx.com -p 80</code> | |
The <code>-sV</code> option lets us fetch the software versions, and by adding <code>--version-intensity 5</code>, we can get the maximum number of possible details about the remote running software. | The <code>-sV</code> option lets us fetch the software versions, and by adding <code>--version-intensity 5</code>, we can get the maximum number of possible details about the remote running software. | ||
Line 63: | Line 49: | ||
By using the powerful NSE we can also try other scripts that will help us fetch remote banners easily: | By using the powerful NSE we can also try other scripts that will help us fetch remote banners easily: | ||
− | + | <code>nmap -sV --script=banner IP</code> | |
== Activities == | == Activities == | ||
Line 71: | Line 57: | ||
=== Advanced === | === Advanced === | ||
# Read [[nmap Changelog]]: https://nmap.org/changelog.html | # Read [[nmap Changelog]]: https://nmap.org/changelog.html | ||
− | |||
− | |||
− | |||
− | |||
==See also== | ==See also== | ||
* {{nmap}} | * {{nmap}} | ||
− | |||
* [[Wikibooks:Hacking/Tools/Network/Nmap]] | * [[Wikibooks:Hacking/Tools/Network/Nmap]] | ||
* {{ping}} | * {{ping}} |
Advertising: