24/7 Phone Services +91- 7477466951
support@drop.org.in UKHRA, Durgapur, West Bengal 713363

Nmap: Advanced Ethical Hacking Tutorial | DROP.ORG.IN

Nmap: Advanced Ethical Hacking Tutorial | DROP.ORG.IN

So on this post today, we will learn about Nmap, what is nmap, why is nmap used and what type of work to use nmap

What IS Nmap

Nmap is a free & open-source network scanner tool created by Gordon Lyon. Nmap is used to discover hosts & services on a computer network by sending packets & analyzing the responses. Nmap provides a number of features for probing computer networks, includin

Why is Nmap Used

Nmap builds on previous network auditing tools to provide quick, detailed scans of network traffic. It works by using IP packets to identify the hosts and IPs active on a network and then analyze these packets to provide information on each host and IP, as well as the operating systems they are running.

What type of work to use Nmap

The program can be used to find live hosts on a network, perform port scanning, ping sweeps, OS detection, and version detection. A number of recent cyber attacks have re-focused attention on the type of network auditing that Nmap provides.

Advanced Nmap Commands

Scan for Specific Port or Port Range

kali > nmap 192.168.89.191 -p25-150

Scanning a Subnet

kali > nmap 192.168.89.0/24 -p80

Spoofing & Decoy Scan

kali > nmap -sS 192.168.89.191 -D 10.0.0.1,10.0.0.2,10.0.0.4

Evading Firewalls

kali > nmap -sS -P0 192.168.89.191

Gathering Version Info

kali > nmap -V 192.168.89.191

UDP Scan

kali > nmap -sU 192.168.89.191

Leave A Reply

Your email address will not be published. Required fields are marked *