0% found this document useful (0 votes)
4 views

nmap

Nmap, or Network Mapper, is an open-source utility developed by Gordon Lyon for scanning networks to identify active hosts and their services. It offers various functions including host discovery, port scanning, and operating system detection, with multiple scanning techniques like TCP SYN Scan, Ping Scan, and UDP Scan. Nmap is widely used for network security assessments and to gather information about devices on a network.

Uploaded by

maddymad5423
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

nmap

Nmap, or Network Mapper, is an open-source utility developed by Gordon Lyon for scanning networks to identify active hosts and their services. It offers various functions including host discovery, port scanning, and operating system detection, with multiple scanning techniques like TCP SYN Scan, Ping Scan, and UDP Scan. Nmap is widely used for network security assessments and to gather information about devices on a network.

Uploaded by

maddymad5423
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Nmap

Network Scanning and Port Scanning Tool

By Adwaidh.v
Agenda
• What is nmap?
• Primary uses of nmap
• Basic nmap functions
• Port scanning
What is nmap?
• Nmap = Network Mapper
• Developed by gorden lyon
• Released in September 1997 stable version in august 2014
• Nmap is an open source utility which can quickly scan broad range of devices and provide
valuable information about the devices on your network
• Nmap is a tool used for determining the hosts that are running and what services the host are
running.
Primary uses of nmap
• Determining open ports and services running in a host
• Determine the operating system running in a host
• Alter the source ip of the scan
• Scriptable Interaction with the target using Nmap Scripting Engine (NSE)
Basic nmap functions
• Host discovery
-which hosts are up (ip addresses)
-ping scans
• Port scanning
-which ports of the target host have servers listening on them
-allows a guess of software and services a machine is running
• OS Detection
-OS Detection/OS fingerprint
Port scanning

• The act of testing a remote port to know in which state it is


• Common port states
-open
-closed
-and filtered
• Scan Displays
-Service Name
-Port number
-Port state
-Protocol
TCP SYN Scan(-sS)

• Allow nmap to gather information about open ports without completing the TCP handshake
TCP SYN Scan (-sT)
• Allow nmap to gather information about open ports with completing the TCP handshake process.
Ping Scan (-sP)
• Ping Scan is quickest scan that nmap perform
• It is useful to determine remote hosts are up or down
Version Detection (-sV)
• Allows nmap to gather version of application of remote host
• The version detection scan runs automatically if the aggressive scan (-A) selected
UDP Scan (-sU)
• UDP has no need to process 3 way handshake or SYN,FIN,and RST
IP Protocol Scan (-sO)
• The IP Protocol Scan attempt to determine IP Protocol support on target.
ACK Scan (-sA)
• ACK Scan to determine port filter or unfilter
Window Scan (-sA)
• Allow nmap to gather information about open ports without completing the TCP handshake process.
• The version detection scan runs automatically if the Aggressive Scan(-A) is selected.
• -sP, -sL, -sO will not run the same command line with version detection
Idlescan(-sl)
• Idle Scan use other station to scan remote host device
Thankyou

You might also like