Difference between revisions of "Nmap"
Jump to navigation
Jump to search
↑ https://nmap.org/book/nping-man.html
↑ https://www.aldeid.com/wiki/Nping
↑ https://serverfault.com/a/608976
Line 1: | Line 1: | ||
− | '''[[ | + | '''[[wikipedia:Nmap|Nmap]]''' (''Network Mapper'') is a security [[Network scanner|scanner]] that can be used to discover [[Host (network)|hosts]] and [[Web service|services]] on a computer or [[computer network]]. Includes at least nmap and nping binaries. |
== Basic nmap commands == | == Basic nmap commands == |
Revision as of 17:16, 25 December 2019
Nmap (Network Mapper) is a security scanner that can be used to discover hosts and services on a computer or computer network. Includes at least nmap and nping binaries.
Contents
Basic nmap commands
- Basic nmap host scan:
nmap -nP HOSTNAME_TO_SCAN
nmap -nP HOSTNAME_TO_SCAN -p 80,443
nmap HOSTNAME_TO_SCAN
- Basic nmap network scan:
nmap -sn 192.168.0.*
(-sn - ping scan so No/disable port scan)
-sn: Ping scan so disable port scan
Basic nping commands
nping is packet generation, response analysis and response time measurement available since 2011 and developed by nmap developers
- "TCP ping":
nping -H -tr 8.8.8.8
(-H Hide-sent do not display sent packets, -tr traceroute)
Activities
Basic
- Use nping to execute a "tcp ping": Check TCP connectivity
Advanced
See also
- Wikibooks:Hacking/Tools/Network/Nmap
- Wikipedia:Nmap
- fping
- ncat
- Wireshark
- Port knocking,
fail2ban
[3]fwknop
, DenyHosts
External Links
- Nmap map page: https://linux.die.net/man/1/nmap
- Official
nmap
manual
Advertising: