Scanning networks with Nmap

 

1. What is Nmap? 🔎

Nmap (Network Mapper) is an open-source tool used for network discovery and security auditing.
It helps identify:

  • Active hosts 🖥️

  • Open ports 🚪

  • Running services ⚙️

  • Operating systems 💻

👉 Commonly used by network administrators and security professionals.


2. Why Use Nmap? 🎯

  • Discover devices on a network 🌐

  • Identify open ports & services 🚪

  • Detect vulnerabilities ⚠️

  • Perform security assessments 🛡️

  • Troubleshoot network issues 🔧


3. Basic Nmap Syntax 🖥️

nmap [scan type] [options] target

Example:

nmap 192.168.1.1

This scans a single host for open ports.


4. Common Nmap Scan Types 🧪

1. Ping Scan (Host Discovery) 🏓

nmap -sn 192.168.1.0/24
  • Finds active devices in a network

  • Does NOT scan ports


2. TCP Connect Scan 🔗

nmap -sT target
  • Full TCP connection

  • Easy to detect


3. SYN Scan (Stealth Scan) 🕵️

nmap -sS target
  • Half-open scan

  • Faster and stealthier


4. Service Version Detection 🔍

nmap -sV target
  • Detects running service versions


5. OS Detection 💻

nmap -O target
  • Attempts to identify operating system


6. Aggressive Scan 🚀

nmap -A target
  • Enables OS detection

  • Version detection

  • Script scanning

  • Traceroute


5. Port Scanning Options 🚪

  • Scan specific port:

nmap -p 80 target
  • Scan multiple ports:

nmap -p 22,80,443 target
  • Scan all ports:

nmap -p- target

6. Output Options 📄

  • Save output to file:

nmap -oN output.txt target

Useful for reporting and documentation 📊


7. Best Practices ⚠️

✅ Always get permission before scanning
✅ Use Nmap in lab or authorized environments only
✅ Avoid aggressive scans on production networks
✅ Analyze results carefully before making conclusions

⚖️ Unauthorized scanning can be illegal.


8. Quick Summary 🧠

Nmap helps you:

  • Discover hosts 🖥️

  • Identify open ports 🚪

  • Detect services & OS 💻

  • Perform security audits 🛡️

Comments

Popular posts from this blog

Introduction to Computer

History of Computer

Computer Generation