- 15 Mar 2021
- 781
- 167
hey everyone welcome to my post. the topic we will discuss today ; What is Nmap?
nmap is information gathering tool port scan site scan etc. Allows you to exploit by providing opportunities and searching open . It is generally an active information gathering tool. wiki post; Nmap is a security scanner developed by computer networks expert Gordon Lyon (Fyodor). It can map the scanned network and observe the status of services running on network machines, operating systems, ports.
as far as you can tell : Nmap use cases
To have information about the systems on the scanned network (such as the port, the application running on it, etc.).
In extracting the network topology.
Performing penetration tests.
In testing the necessary settings when preparing any network.
Network inventory holding, mapping, maintenance and management.
How to Use Nmap
Nmap is preinstalled with the Kali Linux operating system.
To be able to use Nmap, you must be familiar with command line interfaces. Automated rules only help you with basic scanning. When creating the basic nmap command, the sequence “nmap {scan type} {options} {destination}” is based.
To start Nmap, simply type the "nmap" command on the command line.
You can write “nmap -help” and “nmap -h” commands on the command line to learn all the commands and functions in using Nmap.
Nmap Targeting:
nmap x.x.x.x - only scans for an ip address
nmap x.x.x.x-20
Scans ip addresses including x and
nmap x.x.x.x 0/24
Scans 256 ip adress
nmap turkhackteam.org
- scans domain name
In Nmap scanning, targets can be identified at different ranges. For example:
Nmap -sP x.x.x. 0/24 - scan with ping
Nmap -PS x.x.x. 0/24 - Scanning with TCP-Syn
Nmap -PA x.x.x. 0/24 - Scanning with TCP-ACK
Nmap -PE x.x.x. 0/24 - Scanning with ICMP Echo Reguest
Nmap -PU x.x.x. 0/24 - Scan with UDP Ping
Nmap -PR x.x.x. 0/24 - Scan with ARP Ping
Nmap -traceroute x.x.x. 0/24 - performs the path analysis of the package
Nmap -R x.x.x. 0/24 - Discovers hostname from ip addresses
Nmap -system-dns x.x.x. 0/24 - uses DNS servers in the operating system
Nmap Discovery Study:
Analyzes of devices on the network that are standing at that time can be made.
Port Scanning Techniques:
TCP Connect Scan: It sends SYN packet to connect to the destination port, in return, if a SYN/ACK packet comes in, it connects to the port by sending an ACK packet and reports that the port is open, if an RST response is received to the SYN packet, it reports that the port is closed. All sessions opened in this type of scan are logged on the target system.
SYN Scan: SYN scan session does not open completely, when SYN/ACK packet comes in return of SYN packet, it reports that the port is open and logs out by sending RST packet, if the port is closed, the target sends an RST reply.
UDP Scan: Analyzes whether UDP ports are open or closed. If the response to the UDP packet is “ICMP Port Unreacable”, the port is closed; If it is a UDP packet, it is understood that the port is open.
Port Detection and Discovery Scans:
You can learn which ports are open, the services running on these open ports and detailed information about them.
Nmap -sS -p50 x.x.x.x - Scanning with 50 port
Nmap -sS -p1-75 x.x.x.x - Scans ports 1 to 75
Nmap -sS -p7,9,54 x.x.x.x - Scans ports 7,9 and 54
Nmap -sS -p- x.x.x.x - scans all ip addresses on the network
---------------------------------------------------------------------------------------------------
Nmap -sS x.x.x.x - SYN port analysis
Nmap -sU x.x.x.x - UDP port analysis
Nmap -sT x.x.x.x - TCP connection port analysis
Nmap -sS -O x.x.x.x - operating system analysis
Nmap -sS -A x.x.x.x - operating system version analysis
Script Engine:
Nmap -Sc x.x.x.x - uses all scripts during scanning
Nmap -script "http*" - uses http scripts
Source : Nmap - Vikipedi.
Nmap Nedir ve Nasıl Kullanılır?
nmap is information gathering tool port scan site scan etc. Allows you to exploit by providing opportunities and searching open . It is generally an active information gathering tool. wiki post; Nmap is a security scanner developed by computer networks expert Gordon Lyon (Fyodor). It can map the scanned network and observe the status of services running on network machines, operating systems, ports.
as far as you can tell : Nmap use cases
To have information about the systems on the scanned network (such as the port, the application running on it, etc.).
In extracting the network topology.
Performing penetration tests.
In testing the necessary settings when preparing any network.
Network inventory holding, mapping, maintenance and management.
How to Use Nmap
Nmap is preinstalled with the Kali Linux operating system.
To be able to use Nmap, you must be familiar with command line interfaces. Automated rules only help you with basic scanning. When creating the basic nmap command, the sequence “nmap {scan type} {options} {destination}” is based.
To start Nmap, simply type the "nmap" command on the command line.
You can write “nmap -help” and “nmap -h” commands on the command line to learn all the commands and functions in using Nmap.
Nmap Targeting:
nmap x.x.x.x - only scans for an ip address
nmap x.x.x.x-20
Scans ip addresses including x and
nmap x.x.x.x 0/24
Scans 256 ip adress
nmap turkhackteam.org
- scans domain name
In Nmap scanning, targets can be identified at different ranges. For example:
Nmap -sP x.x.x. 0/24 - scan with ping
Nmap -PS x.x.x. 0/24 - Scanning with TCP-Syn
Nmap -PA x.x.x. 0/24 - Scanning with TCP-ACK
Nmap -PE x.x.x. 0/24 - Scanning with ICMP Echo Reguest
Nmap -PU x.x.x. 0/24 - Scan with UDP Ping
Nmap -PR x.x.x. 0/24 - Scan with ARP Ping
Nmap -traceroute x.x.x. 0/24 - performs the path analysis of the package
Nmap -R x.x.x. 0/24 - Discovers hostname from ip addresses
Nmap -system-dns x.x.x. 0/24 - uses DNS servers in the operating system
Nmap Discovery Study:
Analyzes of devices on the network that are standing at that time can be made.
Port Scanning Techniques:
TCP Connect Scan: It sends SYN packet to connect to the destination port, in return, if a SYN/ACK packet comes in, it connects to the port by sending an ACK packet and reports that the port is open, if an RST response is received to the SYN packet, it reports that the port is closed. All sessions opened in this type of scan are logged on the target system.
SYN Scan: SYN scan session does not open completely, when SYN/ACK packet comes in return of SYN packet, it reports that the port is open and logs out by sending RST packet, if the port is closed, the target sends an RST reply.
UDP Scan: Analyzes whether UDP ports are open or closed. If the response to the UDP packet is “ICMP Port Unreacable”, the port is closed; If it is a UDP packet, it is understood that the port is open.
Port Detection and Discovery Scans:
You can learn which ports are open, the services running on these open ports and detailed information about them.
Nmap -sS -p50 x.x.x.x - Scanning with 50 port
Nmap -sS -p1-75 x.x.x.x - Scans ports 1 to 75
Nmap -sS -p7,9,54 x.x.x.x - Scans ports 7,9 and 54
Nmap -sS -p- x.x.x.x - scans all ip addresses on the network
---------------------------------------------------------------------------------------------------
Nmap -sS x.x.x.x - SYN port analysis
Nmap -sU x.x.x.x - UDP port analysis
Nmap -sT x.x.x.x - TCP connection port analysis
Nmap -sS -O x.x.x.x - operating system analysis
Nmap -sS -A x.x.x.x - operating system version analysis
Script Engine:
Nmap -Sc x.x.x.x - uses all scripts during scanning
Nmap -script "http*" - uses http scripts
Source : Nmap - Vikipedi.
Nmap Nedir ve Nasıl Kullanılır?
Moderatör tarafında düzenlendi: