Difference between revisions of "Nmap"
Jump to navigation
Jump to search
↑ https://nmap.org/book/nping-man.html
↑ https://www.aldeid.com/wiki/Nping
↑ https://serverfault.com/a/608976
Line 27: | Line 27: | ||
==See also== | ==See also== | ||
* [[Wikibooks:Hacking/Tools/Network/Nmap]] | * [[Wikibooks:Hacking/Tools/Network/Nmap]] | ||
− | |||
* {{ping}} | * {{ping}} | ||
* [[ncat]] | * [[ncat]] | ||
− | * | + | * {{tcpdump}} |
* {{fail2ban}} | * {{fail2ban}} | ||
* [[MASSCAN]] | * [[MASSCAN]] |
Revision as of 15:55, 5 January 2020
Nmap
(Network Mapper) is a security scanner that can be used to discover hosts and services on a computer or computer network. Includes at least nmap and nping binaries.
Contents
Basic nmap commands
- Basic nmap host scan:
nmap -nP HOSTNAME_TO_SCAN
nmap -nP HOSTNAME_TO_SCAN -p 80,443
nmap HOSTNAME_TO_SCAN
- Basic nmap network scan:
nmap -sn 192.168.0.*
(-sn - ping scan so No/disable port scan)
-sn: Ping scan so disable port scan
- OS detection:
nmap -O IP
Basic nping commands
nping is packet generation, response analysis and response time measurement available since 2011 and developed by nmap developers
- "TCP ping":
nping -H -tr 8.8.8.8
(-H Hide-sent do not display sent packets, -tr traceroute)
Activities
Basic
- Use nping to execute a "tcp ping": Check TCP connectivity
Advanced
See also
- Wikibooks:Hacking/Tools/Network/Nmap
ping
,nping
,arping
,fping, gping
,hping
,mtr
,traceroute
,tcptraceroute
,tracepath
,Test-Connection
Powershell cmdlet,iperf
, Ping (PAN-OS), BWPing,check_ping
,ping -M
,ios ping, ping -a
- ncat
- Packet analyzer:
tcpdump
,Wireshark
, snoop (Solaris),ngrep
, Wireshark,dSniff
, netsniff-ng, Corvil, PAN-OS, pcap - Port knocking,
fail2ban
[3]fwknop
, DenyHosts - MASSCAN
whois
, IP address,geoiplookup
,ip2location
Advertising: