What is nmap? How to Use Nmap?

 WHAT IS NMAP?

namp . What is Nmap? (dp1h3r0x)








ANS:

  Nmap is an open-source and a free tools for network discovery and 

  Security observing. Nmap is short for Network Mapper. It is an 

  open-source Linux command-line tool that is used to scan IP 

  addresses and ports in a network and to detect installed 

  applications. Nmap allows network admins to find which devices 

  are running on their network, discover open ports and services, and 

  detect vulnerabilities.

 

 

NMAP COMMANDS CHEAT SHEET

 

 1. Nmap Commands For Port Scanning:

 

Description                                                                                                Commands

To scan a single port using Nmap:                                   
nmap -p 8 [TARGET_IP]

To scan a range of ports using Nmap:                     
nmap -p 1-20  [TARGET_IP]

For scanning common ports of the network:                   
nmap -F [TARGET_IP]

 
If you want to scan all the  ports of the network, then use the corresponding command:                                                      
nmap -p- [TARGET_IP]

 


2. Nmap Commands For OS and Version Detection:

 

 

DescriptionCommands
For detection of OS and the services:nmap -A [TARGET_IP]
To detect aggressive services:nmap -sV –version-intensity 4 [TARGET_IP]
For service version detection:nmap -sV   [TARGET_IP]
 

 
How to use nmap ? Nmap Command (cmd)

 3. To get more Information about Using NSE Scripts:

 

 

 

DescriptionCommands
To scan some default scripts: nmap -sV -sC   [TARGET_IP]
Nmap command for scanning a set of scripts:nmap -sV –script=aqb*   [TARGET_IP]
To scan a specific NSE script:nmap -sV -p 443 –script=name_to_sc.nse   [TARGET_IP]


4. Nmap Commands For Port Scan Types:

 

DescriptionCommands
To scan selected ports nmap -Pn -F  [TARGET_IP]
Nmap command to scan UDP ports:nmap -sU -p 123, 161  [TARGET_IP]
To scan using TCP SYN scan : nmap -sS   [TARGET_IP]
To scan using TCP connect to port: nmap -sT  [TARGET_IP]

 


5. Nmap commands for different Output Formats:

 

 

DescriptionCommands
 to save default output to a file:    
    nmap -oN test.txt     [TARGET_IP]
To save the output in all formats:nmap -oA test        [TARGET_IP]
To save results in XML format:nmap -oX test.xml   [TARGET_IP]

To save the Nmap results in format for grepable  output:   nmap -oG test.txt      [TARGET_IP]


 

THANK YOU FOR READING THIS BLOG .




Read More Blog.....


Top 5 Operating System (OS) for Hacking.......


Read CTF WriteUp....


0 Comments