Introduction to Nmap

Nmap, short for Network Mapper, is an industry-standard for discovering different services and hosts. Oftentimes, it is used by hackers to find and exploit open ports that enable them to obtain access to sensitive data. This can lead to a strategic risk that can permanently damage the information and service integrity of the owner. White hatters also use Nmap to scope the landscape of open ports, but to ensure that they are adjusted accordingly to maintain proper accessibility. In this piece, I cover some beginner essentials for using Nmap, including popular flags, many of which can be expounded upon through the ‘man nmap’ description.

NMAP Feature/Flag

Description

-sS

Syn Scan

-sU

UDP Scan

-O

Operating System

-sV

Service Version

-vv

Verbosity (v x2)

-oA / -oN / -oG

Save Results to all three major formats/normal formal/grepable format

-A

Aggressive scan that activates service detection, operating system detecetion, a traceroute, and common script scanning

-T5

Timing level () --> The greater, the nosier and quicker

-p (#-# for specific range of ports, - for all ports)

scan specific port

--script

Activate script from nmap scripting library

-sT

TCP Connect Scan

Categories: Cyber

0 Comments

Leave a Reply

Avatar placeholder

Your email address will not be published. Required fields are marked *

css.php