NMAP SCANS

Learning how to use NMAP

Perform A TCP Port Scan Using Nmap

Background

Nmap is a network exploration and security auditing tool. It can be used to identify hosts and services on a network, as well as security issues. Nmap can be used to scan for vulnerable open ports on systems.

When scanning for open ports on a target system, the nmap tool can be used to identify the TCP ports that are open. This can be useful for understanding which services are running on a system and for securing these services by implementing firewalls or other security measures.

The different flags in nmap are used to change the behavior of the scan.

Tags that could be utilized:

-sS: This is a TCP SYN Scan. Used for quickly scanning many ports with a half-connection

-sT: This is a full TCP connection Scan

Examples:

sudo nmap -sS [HOST_ADDR]:

sudo nmap -sT [HOST_ADDR]:

Background

Nmap is a network exploration and security auditing tool. It can be used to identify hosts and services on a network, as well as security issues. Nmap can be used to scan for vulnerable open ports on systems.

One of the many benefits of using Nmap is its ability to identify open UDP ports on a target system. This can be quite useful when trying to determine what services are running on a system as well as what versions of those services are in use. Additionally, Nmap can be used to fingerprint devices and applications that are communicating over UDP. By identifying the specific ports and applications that are in use, you can better understand the security posture of a target system.

The different flags in nmap are used to change the behavior of the scan.

Exercise

Use Nmap to perform UDP port scans against a remote target machine.

Learning Objective(s)

Scanning and fingerprinting open ports is a key skills employed in almost every penetration testing engagement.

Tags that could be utilized:

-sU: uses UDP to run a scan for UDP services such as DNS, SNMP, and DCHP.

Example:

sudo nmap -sU [HOST_ADDR]

Last updated