Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
215 views

Nmap Command

Nmap is a network scanning tool that can scan ports on local and remote machines to determine which ports are open, the operating systems in use, software versions and other details. It can be used to scan entire networks and subnets and has options like verbose scanning, scanning multiple hosts from a file or IP range, and fast scanning of common ports. However, permission should be obtained before scanning machines you do not own.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
215 views

Nmap Command

Nmap is a network scanning tool that can scan ports on local and remote machines to determine which ports are open, the operating systems in use, software versions and other details. It can be used to scan entire networks and subnets and has options like verbose scanning, scanning multiple hosts from a file or IP range, and fast scanning of common ports. However, permission should be obtained before scanning machines you do not own.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Nmap command

Introduction
• NMAP abbreviation is network mapper
• NMAP is used to scan ports on a machine, either local or
remote machine (just you require IP/hostname to scan).
• NMAP is can be installed on windows, Sun Solaris
machines too.
• NMAP can be used to scan large networks, remember I
am saying large networks.
• NMAP can be used to get operating system details such
as open ports,
• software used for a service and it’s version no,
• vendor of network card and up time of that system too
• Please do not try to use NMAP on machines which
you don’t have permission.
• Can be used by hackers to scan for systems for
vulnerability.
• 192.168.0.100 – server1.tecmint.com
• 192.168.0.101 – server2.tecmint.com
Scan a System with Hostname and IP Address

• The Nmap tool offers various methods to scan a system.


• Perform a scan using hostname as server2.tecmint.com to find
out all open ports, services and MAC address on the system.
Scan using “-v” option

• we can see that the below command with “-v”


option is giving more detailed information about
the remote machine.
Scan Multiple Hosts
• We can scan multiple hosts by simply writing their
IP addresses or hostnames with Nmap.
Scan a whole Subnet

• we can scan a whole subnet or IP range with Nmap


by providing * wildcard with it.
 Scan Multiple Servers using last octet of IP address

• You can perform scans on multiple IP address by


simple specifying last octet of IP address.
Scan list of Hosts from a File
• If we have more hosts to scan and all host details
are written in a file , we can directly ask nmap to
read that file and perform scans. Let’s see how to
do that.
• Create a text file called “nmaptest.txt” and define
all the IP addresses or hostname of the server that
you want to do a scan.
• Next, run the following command with “iL” option
with nmap command to scan all listed IP address in
the file.
• # nmap –iL filename
Scan an IP Address Range

• We can specify an IP range while performing scan


with Nmap.
Perform a Fast Scan

• We can perform a fast scan with “-F” option to


scans for the ports listed in the nmap-services files
and leaves all other ports.
• # nmap hostname

You might also like