🛠️ Using Nmap for Network Scanning 🛠️
Nmap (Network Mapper) is a powerful open-source tool for network discovery and security auditing. Below are some common commands and their uses:
Installation
To install Nmap on a Debian-based system (like Ubuntu), use the following command:
sudo apt-get update -y
sudo apt-get install nmap -y
Basic Commands
Perform a Basic Port Scan
This command scans for open ports on the specified host:
nmap example.com
Replace example.com
with the target host or IP address.
Specify a Range of Ports
To scan a specific range of ports:
nmap -p 80-100 example.com
This scans ports 80 through 100.
Scan All Ports (Full Port Scan)
To scan all 65535 ports:
nmap -p- example.com
Aggressive Scan with OS Detection
An aggressive scan includes OS detection, version detection, script scanning, and traceroute:
nmap -A example.com
Verbose Output
For more detailed output:
nmap -vv example.com
Advanced Scanning
OS Detection
To detect the operating system of the target:
nmap -O your-website.com
Useful Script Scanning
To run a vulnerability script scan, which uses Nmap's scripting engine to check for common vulnerabilities:
nmap --script vuln your-website.com
Additional Notes
- Replace
example.com
andyour-website.com
with the actual domain or IP address you want to scan. - Use
nmap
responsibly and ensure you have permission to scan the target systems. Unauthorized scanning can be illegal and unethical.
This documentation provides a foundational overview of common
nmap
commands to get you started with network scanning and security assessments.