Practical : 1 Vulnerability assessment of a system using NMAP.
1.TCP SYN scan
2.TCP FIN scan
3.Port scan
Nmap stands for Network Mapper. It is an open source security
tool for network exploration, security scanning and auditing.
However, nmap command comes with lots of options that can
make the utility more robust and difficult to follow for new users.
The purpose of this post is to introduce a user to the nmap
command line tool to scan a host and/or network, so to find out
the possible vulnerable points in the hosts.
NMAP uses raw IP packets in novel ways to determine what hosts
are available on the network, what services (application name and
version) those hosts are offering, what operating systems (and OS
versions) they are running, what type of packet filters/firewalls are
in use, and dozens of other characteristics.
1: Scan a single host or an IP address (IPv4)
3. Scan Multiple Hosts
4. Scan a whole Subnet
5. Scan Multiple Servers using last octet of IP address
6. Scan list of Hosts from a File
7. Scan an IP Address Range
8. Scan Network Excluding Remote Hosts
9. Scan OS information and Traceroute
10. Enable OS Detection with Nmap
11. Scan a Host to Detect Firewall
12. Scan a Host to check its protected by Firewall
13. Find out Live hosts in a Network
14. Perform a Fast Scan
15. Find Nmap version
16. Scan Ports Consecutively
17. Print Host interfaces and Routes
18. Scan for specific Port
19. Scan a TCP Port
20. Scan a UDP Port
21. Scan Multiple Ports
22. Scan Ports by Network Range
23. Find Host Services version Numbers
24. Scan remote hosts using TCP ACK (PA) and TCP Syn (PS)
25. Scan Remote host for specific ports with TCP ACK
26. Scan Remote host for specific ports with TCP Syn
27. Perform a stealthy Scan
28. Check most commonly used Ports with TCP Syn
29. Perform a tcp null scan to fool a firewall