Thursday

Become Nmap Master With This Quick Tut For Nmap 7.80 Latest

🦠
◾️ One of the most basic functions of Nmap is to identify active hosts on your network. Nmap does this by using a ping scan. This identifies all of the IP addresses that are currently online without sending any packers to these hosts. ◾️

📍 To run a ping scan, run the following command:

🦠
# nmap -sp 192.100.1.1/24
🦠

◾️ This command then returns a list of hosts on your network and the total number of assigned IP addresses. ◾️

🦠 How To Run A Host Scan 🦠

◾️ A more powerful way to scan your networks is to use Nmap to perform a host scan. Unlike a ping scan, a host scan actively sends ARP request packets to all the hosts connected to your network. Each host then responds to this packet with another ARP packet containing its status and MAC address. ◾️

To run a host scan, use the following command:

🦠
# nmap -sp <target IP range>
🦠

◾️ _This returns information on every host, their latency, their MAC address, and also any description associated with this address. This can be a powerful way of spotting suspicious hosts connected to your network. ◾️

 If you see anything unusual in this list, you can then run a DNS query on a specific host, by using:

🦠
# nmap -sL <IP address>
🦠

This returns a list of names associated with the scanned IP. This description provides information on what the IP is actually for.

 🦠
🦠 1. Ping Scanning 🦠

◾️ # ◾️

🦠 2. Port Scanning 🦠

◾️ # sS TCP SYN scan ◾️

◾️ # sT TCP connect scan ◾️

◾️ # sU UDP scans ◾️

◾️ # sY SCTP INIT scan ◾️

◾️ # sN TCP NULL ◾️

🦠 3. Host Scanning 🦠

◾️ # nmap -sp <target IP range> ◾️

🦠 4. OS Scanning 🦠

◾️ nmap -O <target IP> ◾️

🦠 5. Scan The Most Popular Ports 🦠

◾️ nmap --top-ports 20 192.168.1.106 ◾️

🦠 6. Output To A File 🦠

◾️ -oN output.txt ◾️ (To a Text File)

 ◾️ -oX output.xml ◾️ (To An XML)

🦠 7. Disable DNS Name Resolution 🦠

◾️ # nmap -sp -n 192.100.1.1/24 ◾️

🦠 @HashBrownie123

No comments: