
NMAP (Network Mapper) is a security scanner mainly developed for LINUX platforms but later on ported to Windows, Solaris and BSD Variants. This tool is used to discover hosts and services on a computer network.
NMAP Author – Gordon Lyon
Download Link – Click Here
This software provides numerous no. of features as listed below –
- Host discovery – This software identifies the hosts on a network that respond to TCP and/or ICMP requests.
- Port scanning – It also enumerating the open ports on target hosts or network.
- Version detection – It also interrogates network services on remote devices to determine application name and version number.
- OS detection – It also determines the operating system and hardware characteristics of network devices.
Nmap also provides further information on targets, including reverse DNS names, device types, and MAC addresses.
Typical uses of NMAP:
- Auditing the security of a device or firewall by identifying the network connections which can be made to, or through it.
- Identifying open ports on a target host in preparation for auditing.
- Network inventory, network mapping, maintenance and asset management.
- Auditing the security of a network by identifying new servers.
- Generating traffic to hosts on a network.
- Find and exploit vulnerabilities in a network.
Some Useful Command Attributes –
-sS = Stealth Scanning
-sT = TCP Connect() Scanning
-sF = FIN Scanning
-sN = Null Scanning
-sX = Xmas Tree Scanning
-sP = Ping Scan
-sU = UDP Scanning
-sO = IP Protocol Scan
-sI = Idle Scanning
-sV = Version Detection
-sA = ACK Scanning
-sW = Window Scanning
-sR = RPC Scanning
-sL = List Scanning
History – Nmap was first published in September 1997, as an article in Phrack Magazine with source-code included. With help and contributions of the computer security community, development continued. Enhancements included operating system fingerprinting, service fingerprinting, code rewrites (C to C++), additional scan types, protocol support (e.g. IPv6, SCTP) and new programs that complement Nmap’s core features. (from…wikipedia)
For more info about NMAP, you can also download this E-Book –
NMAP6: Network exploration and security auditing Cookbook
About book – The book is a collection of easy to follow, practical recipes with explanations of the code, and links to further information. This book is for any security consultant, administrator or enthusiast looking to learn how to use and master Nmap and the Nmap Scripting Engine. (via.. amazon)
You may also like:- Collecting and Analyzing Threat Data for Effective Threat Intelligence
- How Digital Forensics Helps To Investigate Cryptocurrency Scams and Hacks
- 7 Key Best Practices for Developing Secure Applications
- Vulnerability Assessment in Web Applications – Steps, Strategies, and Tools
- Top Advanced Techniques for Malware Analysis And Detection
- How to Simulate Real-World Attacks for Better Security – The Red Teaming Approach
- How You Can Secure Your Cloud Environments with Blockchain Technology
- Best Practices for Secure Development within SSDL Framework
- How Machine Learning Enhances Cloud Security – A Comprehensive Guide
- The Role of Social Engineering in Penetration Testing
This Post Has One Comment
Comments are closed.