Nmap, which stands for "Network Mapping",is very popular tool that is used to scan networks and gathering information about them. Nmap utilizes IP packets for known which hosts are available on the network.
“Fixing a hole is far more effective than trying to hide it. That approach is also less stressful than constantly worrying that attackers may find the vulnerabilities.”-- Gordon Fyodor Lyon
Nmap contains all types of syntaxs such as, scanning a single IP, scanning a host,Scanning a range of IPs,Scan using TCP SYN scan. and much more! Below I have given a few examples how to use Nmaps syntax and why this is very useful.
Note for these examples I am running Nmap against my Metasploitable machine
1. Scanning a single IP
![](https://static.wixstatic.com/media/642e54_07265f68b9df40cea3b6745e12a85f57~mv2.jpg/v1/fill/w_648,h_204,al_c,q_80,enc_auto/642e54_07265f68b9df40cea3b6745e12a85f57~mv2.jpg)
As shown above, with a quick scan against our machine, we have discovered it has an open port aswell as the service running, which in this case is ssh.
2. Scanning for the Service/Version
For this to work we will be using the -sV option.
![](https://static.wixstatic.com/media/642e54_eaf41659cabb437583ee264bd90361ea~mv2.jpg/v1/fill/w_774,h_191,al_c,q_80,enc_auto/642e54_eaf41659cabb437583ee264bd90361ea~mv2.jpg)
And within a few seconds we have got what port is open, the port number, the service and now we have what version it is running!
Now you might be asking yourself why is this is important? Knowing the service is one thing, but having the version will help us narrow down a exploit.
*** Only scan networks that you have permission to do***
3. Scanning a IP for vulnerabilities
Finally I will show you a quick and easy command in Nmap to scan the machine for open ports and their vulnerabilities.
![](https://static.wixstatic.com/media/642e54_7f7f656c49d44f669a9aa0fb12fad538~mv2.jpg/v1/fill/w_855,h_414,al_c,q_80,enc_auto/642e54_7f7f656c49d44f669a9aa0fb12fad538~mv2.jpg)
Within 5 seconds we have found that our service running on port 22 has 10 CVE related to it.
A quick google search on the CVE and you should be google to go!
Hashtags
#hacking #hacker #cybersecurity #ethicalhacking #hackers #linux #programming #hack #technology #kalilinux #security #coding #infosec #python #tech #hackingtools #ethicalhacker #pentesting #cyber #malware #programmer #computerscience #cybercrime #cyberattack #informationsecurity #hacked #anonymous #cybersecurityawareness #coder #metasploit #Nmap #Networking
Comments