http://kalitut.blogspot.ca/2015/12/nmap-command-for-network-admins.html
some of the most used Nmap command Linux
Every network admin knows about Nmap every one of them use it or used it.
It’s one of the best, it’s best of the best originally it is a Linux-only utility,
But it was ported to:
When a software get ported to all those OS it’s a mark for how important that software is,
Whatever you are trying to do as a network admin or a Penetration Tester you will need to work with Nmap one day
What is Nmap ?
Nmap ("Network Mapper") is an open source tool for network exploration and security auditing.
It was designed to rapidly scan large networks, yet it works fine against single hosts.
Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.
With Nmap you can know:
What computers are running on a local network.
What IP addresses are running on a local network.
What is the operating system of your target machine.
What ports are open on the machine that you just scanned.
Find out if the system is infected with malware or virus.
Search for unauthorized servers or network service on your network.
Find and remove computers which don’t meet the organization’s minimum level of security.
While Nmap is commonly used for security audits, many systems and network administrators, find it useful for routine tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.
To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyzes the responses.
The software provides a number of features for probing computer networks we will try to learn some of the features together
Nmap originally written by Gordon Lyon first release in September 1997 Written in C, C++, Python, Lua
So now after knowing almost everything we need to know about Nmap we will start with the command list.
1) Nmap Scan a single host or an IP address (IPv4)
The output will show you some interesting open port and the MAC Address
2) Scan multiple IP address or subnet (IPv4)
3) Read list of hosts/networks from a file (IPv4)
The -iL option allows you to read the list of target systems using a text file.
This is useful to scan a large number of hosts/networks.
Create a text file as follows:
Your Text file should look like this ( Test.txt )
here is your commend
4) Excluding hosts/networks (IPv4)
When scanning a large number of hosts/networks you can exclude hosts from a scan:
OR exclude list from a file called /tmp/exclude.txt
5) Turn on OS and version detection scanning script (IPv4)
The results of a scan might determine that a machine is listening on port 80, without knowing its corresponding OS and Web Server version makes the task of attempted compromise a “shot in the dark” methodology.
NMap solve this dilemma by using OS and Version detection. The following commands:
6) Check if a host/network is protected by a firewall
7) Scan a host when protected by the firewall
8) Scan an IPv6 host/address
The -6 option enable IPv6 scanning. The syntax is:
9) Scan a network and find out which servers and devices are up and running
This is known as host discovery or ping scan:
11) Only show open (or possibly open) ports :
12) Show all packets sent and received
13) Show host interfaces and routes
This is useful for debugging (ip command or route command or netstat command like output using nmap)
Sample outputs:
14) Scan specific ports
Sample outputs:
15) Scan all your devices/computers for open ports ever
16) detect remote operating system?
You can identify a remote host apps and OS using the -O option:
Sample outputs:
19) Scan a host using IP protocol ping
20) Scan a host using UDP ping
This scan bypasses firewalls and filters that only screen TCP:
21) Find out the most commonly used TCP ports using TCP SYN Scan
22) Scan a host for UDP services (UDP scan)
Most popular services on the Internet run over the TCP protocol. DNS, SNMP, and DHCP are three of the most common UDP services. Use the following syntax to find out UDP services:
23) Scan for IP protocol
This type of scan allows you to determine which IP protocols (TCP, ICMP, IGMP, etc.) are supported by target machines:
24) Scan a firewall for security weakness
The following scan types exploit a subtle loophole in the TCP and good for testing security of common attacks:
25) Scan a firewall for packets fragments:
The -f option causes the requested scan (including ping scans) to use tiny fragmented IP packets. The idea is to split up the TCP header over
several packets to make it harder for packet filters, intrusion detection systems, and other annoyances to detect what you are doing.
26) Cloak a scan with decoys
The -D option it appear to the remote host that the host(s) you specify as decoys are scanning the target network too. Thus their IDS might report 5-10 port scans from unique IP addresses, but they won’t know which IP was scanning them and which were innocent decoys:
27) Scan a firewall for MAC address spoofing:
28) How to save output to a text file
The syntax is:
Those are the most important commend for NMAP
but those days many want thing to be more simple easy just a click and it scan , for that we have Zenmap
Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users.
you can download it from here Link
Hope you found what you want here , leave a comment let me know what you need i will do my best to help
and keep in mind learning the commend lines is very important sometime you just have to deal with it without a GUI Scanner.
some of the most used Nmap command Linux
Every network admin knows about Nmap every one of them use it or used it.
It’s one of the best, it’s best of the best originally it is a Linux-only utility,
But it was ported to:
When a software get ported to all those OS it’s a mark for how important that software is,
Whatever you are trying to do as a network admin or a Penetration Tester you will need to work with Nmap one day
What is Nmap ?
Nmap ("Network Mapper") is an open source tool for network exploration and security auditing.
It was designed to rapidly scan large networks, yet it works fine against single hosts.
Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.
With Nmap you can know:
What computers are running on a local network.
What IP addresses are running on a local network.
What is the operating system of your target machine.
What ports are open on the machine that you just scanned.
Find out if the system is infected with malware or virus.
Search for unauthorized servers or network service on your network.
Find and remove computers which don’t meet the organization’s minimum level of security.
While Nmap is commonly used for security audits, many systems and network administrators, find it useful for routine tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.
To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyzes the responses.
The software provides a number of features for probing computer networks we will try to learn some of the features together
Nmap originally written by Gordon Lyon first release in September 1997 Written in C, C++, Python, Lua
So now after knowing almost everything we need to know about Nmap we will start with the command list.
1) Nmap Scan a single host or an IP address (IPv4)
The output will show you some interesting open port and the MAC Address
2) Scan multiple IP address or subnet (IPv4)
3) Read list of hosts/networks from a file (IPv4)
The -iL option allows you to read the list of target systems using a text file.
This is useful to scan a large number of hosts/networks.
Create a text file as follows:
Your Text file should look like this ( Test.txt )
facebook.comLets say the text file is in tmp
Yahoo.com
192.168.1.0/24
192.168.1.1/24
10.15.23.7
localhost
here is your commend
4) Excluding hosts/networks (IPv4)
When scanning a large number of hosts/networks you can exclude hosts from a scan:
OR exclude list from a file called /tmp/exclude.txt
5) Turn on OS and version detection scanning script (IPv4)
The results of a scan might determine that a machine is listening on port 80, without knowing its corresponding OS and Web Server version makes the task of attempted compromise a “shot in the dark” methodology.
NMap solve this dilemma by using OS and Version detection. The following commands:
6) Check if a host/network is protected by a firewall
7) Scan a host when protected by the firewall
8) Scan an IPv6 host/address
The -6 option enable IPv6 scanning. The syntax is:
9) Scan a network and find out which servers and devices are up and running
This is known as host discovery or ping scan:
Sample outputs:10) Display the reason a port is in a particular state:
Host 192.168.1.1 is up (0.00035s latency).
MAC Address: BC:AE:C5:C3:16:93 (Unknown)
Host 192.168.1.2 is up (0.0038s latency).
MAC Address: 74:44:01:40:57:FB (Unknown)
Host 192.168.1.5 is up.
Host nas03 (192.168.1.12) is up (0.0091s latency).
MAC Address: 00:11:32:11:15:FC (Synology Incorporated)
Nmap done: 256 IP addresses (4 hosts up) scanned in 2.80 second
11) Only show open (or possibly open) ports :
12) Show all packets sent and received
13) Show host interfaces and routes
This is useful for debugging (ip command or route command or netstat command like output using nmap)
Sample outputs:
14) Scan specific ports
Sample outputs:
15) Scan all your devices/computers for open ports ever
16) detect remote operating system?
You can identify a remote host apps and OS using the -O option:
Sample outputs:
17) detect remote services (server / daemon) version numbers:
Sample outputs:
18) Scan a host using TCP ACK (PA) and TCP Syn (PS) ping
If firewall is blocking standard ICMP pings, try the following host discovery methods:
18) Scan a host using TCP ACK (PA) and TCP Syn (PS) ping
If firewall is blocking standard ICMP pings, try the following host discovery methods:
19) Scan a host using IP protocol ping
This scan bypasses firewalls and filters that only screen TCP:
21) Find out the most commonly used TCP ports using TCP SYN Scan
22) Scan a host for UDP services (UDP scan)
Most popular services on the Internet run over the TCP protocol. DNS, SNMP, and DHCP are three of the most common UDP services. Use the following syntax to find out UDP services:
23) Scan for IP protocol
This type of scan allows you to determine which IP protocols (TCP, ICMP, IGMP, etc.) are supported by target machines:
24) Scan a firewall for security weakness
The following scan types exploit a subtle loophole in the TCP and good for testing security of common attacks:
25) Scan a firewall for packets fragments:
The -f option causes the requested scan (including ping scans) to use tiny fragmented IP packets. The idea is to split up the TCP header over
several packets to make it harder for packet filters, intrusion detection systems, and other annoyances to detect what you are doing.
26) Cloak a scan with decoys
The -D option it appear to the remote host that the host(s) you specify as decoys are scanning the target network too. Thus their IDS might report 5-10 port scans from unique IP addresses, but they won’t know which IP was scanning them and which were innocent decoys:
27) Scan a firewall for MAC address spoofing:
28) How to save output to a text file
The syntax is:
Those are the most important commend for NMAP
but those days many want thing to be more simple easy just a click and it scan , for that we have Zenmap
Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users.
you can download it from here Link
Hope you found what you want here , leave a comment let me know what you need i will do my best to help
and keep in mind learning the commend lines is very important sometime you just have to deal with it without a GUI Scanner.
No comments:
Post a Comment