[go: up one dir, main page]

0% found this document useful (0 votes)
51 views10 pages

Nmap Guide for Security Newbies

This document discusses using Nmap to perform a vulnerability assessment of a system. It describes performing TCP SYN, FIN, and port scans with Nmap to find possible vulnerable points on hosts. The purpose is to introduce how to use the Nmap command line tool to scan hosts and networks to discover services, operating systems, firewalls, and other characteristics. It then lists 29 different Nmap scan techniques that can be used, such as scanning single hosts, subnets, port ranges, OS detection, firewall detection, and stealth scans.

Uploaded by

Kavisha Solanki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views10 pages

Nmap Guide for Security Newbies

This document discusses using Nmap to perform a vulnerability assessment of a system. It describes performing TCP SYN, FIN, and port scans with Nmap to find possible vulnerable points on hosts. The purpose is to introduce how to use the Nmap command line tool to scan hosts and networks to discover services, operating systems, firewalls, and other characteristics. It then lists 29 different Nmap scan techniques that can be used, such as scanning single hosts, subnets, port ranges, OS detection, firewall detection, and stealth scans.

Uploaded by

Kavisha Solanki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Practical : 1 Vulnerability assessment of a system using NMAP.

1.TCP SYN scan

2.TCP FIN scan

3.Port scan

 Nmap stands for Network Mapper. It is an open source security


tool for network exploration, security scanning and auditing.
However, nmap command comes with lots of options that can
make the utility more robust and difficult to follow for new users.
 The purpose of this post is to introduce a user to the nmap
command line tool to scan a host and/or network, so to find out
the possible vulnerable points in the hosts.
 NMAP uses raw IP packets in novel ways to determine what hosts
are available on the network, what services (application name and
version) those hosts are offering, what operating systems (and OS
versions) they are running, what type of packet filters/firewalls are
in use, and dozens of other characteristics.

1: Scan a single host or an IP address (IPv4)

3. Scan Multiple Hosts


4. Scan a whole Subnet

5. Scan Multiple Servers using last octet of IP address

6. Scan list of Hosts from a File


7. Scan an IP Address Range

8. Scan Network Excluding Remote Hosts


9. Scan OS information and Traceroute
10. Enable OS Detection with Nmap

11. Scan a Host to Detect Firewall

12. Scan a Host to check its protected by Firewall


13. Find out Live hosts in a Network

14. Perform a Fast Scan

15. Find Nmap version


16. Scan Ports Consecutively

17. Print Host interfaces and Routes

18. Scan for specific Port

19. Scan a TCP Port


20. Scan a UDP Port
21. Scan Multiple Ports

22. Scan Ports by Network Range

23. Find Host Services version Numbers


24. Scan remote hosts using TCP ACK (PA) and TCP Syn (PS)

25. Scan Remote host for specific ports with TCP ACK

26. Scan Remote host for specific ports with TCP Syn
27. Perform a stealthy Scan

28. Check most commonly used Ports with TCP Syn


29. Perform a tcp null scan to fool a firewall

You might also like