NMAP (Network Mapper) is a security scanner mainly developed for LINUX platforms but later on ported to Windows, Solaris and BSD Variants. This tool is used to discover hosts and services on a computer network.
NMAP Author – Gordon Lyon
Download Link – Click Here
This software provides numerous no. of features as listed below –
- Host discovery – This software identifies the hosts on a network that respond to TCP and/or ICMP requests.
- Port scanning – It also enumerating the open ports on target hosts or network.
- Version detection – It also interrogates network services on remote devices to determine application name and version number.
- OS detection – It also determines the operating system and hardware characteristics of network devices.
Nmap also provides further information on targets, including reverse DNS names, device types, and MAC addresses.
Typical uses of NMAP:
- Auditing the security of a device or firewall by identifying the network connections which can be made to, or through it.
- Identifying open ports on a target host in preparation for auditing.
- Network inventory, network mapping, maintenance and asset management.
- Auditing the security of a network by identifying new servers.
- Generating traffic to hosts on a network.
- Find and exploit vulnerabilities in a network.
Some Useful Command Attributes –
-sS = Stealth Scanning
-sT = TCP Connect() Scanning
-sF = FIN Scanning
-sN = Null Scanning
-sX = Xmas Tree Scanning
-sP = Ping Scan
-sU = UDP Scanning
-sO = IP Protocol Scan
-sI = Idle Scanning
-sV = Version Detection
-sA = ACK Scanning
-sW = Window Scanning
-sR = RPC Scanning
-sL = List Scanning
History – Nmap was first published in September 1997, as an article in Phrack Magazine with source-code included. With help and contributions of the computer security community, development continued. Enhancements included operating system fingerprinting, service fingerprinting, code rewrites (C to C++), additional scan types, protocol support (e.g. IPv6, SCTP) and new programs that complement Nmap’s core features. (from…wikipedia)
For more info about NMAP, you can also download this E-Book –
NMAP6: Network exploration and security auditing Cookbook
About book – The book is a collection of easy to follow, practical recipes with explanations of the code, and links to further information. This book is for any security consultant, administrator or enthusiast looking to learn how to use and master Nmap and the Nmap Scripting Engine. (via.. amazon)
You may also like:- CTEM – A Strategic Approach to Mitigating Cyber Risks
- AI in Penetration Testing – Revolutionizing Security Assessments
- Protecting Your Organization from AI-Enhanced Social Engineering Attacks
- The Rise of AI-Powered Cyber Attacks in 2025
- Top 5 Penetration Testing Methodologies to Follow in 2025
- Top 10 Penetration Testing Tools Every Security Professional Should Know in 2025
- Emerging Trends in Vulnerability Assessment and Penetration Testing (VAPT) for 2025
- The Role of Cybersecurity in Protecting IoT Devices in 2025
- Understanding the Five Phases of Penetration Testing
- Top 20 Cybersecurity Career Options
This Post Has One Comment
Comments are closed.