SCANNING NETWORKS WITH NMAP

 NETWORK SCANNING



Welcome Back!, In the previous blog we talked about the introduction of Nmap. here today we shall discuss the Network scanning techniques in Nmap.

Basic Syntax

nmap [ <Scan Type> ...] [ <Options> ] { <target specification> }

Nmap Usage

Single Scan

nmap [target] ex: nmap 198.43.12.xx 

Multi-Scan

nmap [target1, target2, etc] ex: nmap 198.43.12.xx198.43.12.xx  

Scan a List of Targets

nmap -iL [list.txt] ex: nmap hosts.txt 

Perform Aggressive Scan

nmap -A [target] ex: nmap -A 127.0.0.1 

Perform Scan with Verbose

nmap -A [target] -v ex: nmap -A 127.0.0.1 -v
example_demo

 PORT SCANNING OPTIONS

Single Command

nmap -F [target]

Scan All ports

nmap -p 1-65535 [target]

Scan Top Ports

nmap --top-ports [number] [target]

Detecting Unknown OS

nmap -O --osscan-guess [target]


Conclusion

As we have all seen the few commands on how to use Nmap to scan targets & ports, in the next blog we shall see more indepth of this Powerful software/tool.

 

 

 

Nmap Scan Descriptions

Nmap Switch Description
-sA ACK scan
-sF FIN scan
-sI IDLE scan
-sL DNS scan (a.k.a. list scan)
-sN NULL scan
-sO Protocol scan
-sP Ping scan
-sR RPC scan
-sS SYN scan
-sT TCP connect scan
-sW Windows scan
-sX XMAS scan

hi

Post a Comment

Previous Post Next Post