Explore the network with Nmap

Explore the network with Nmap

Nmap is a tool for port scanning the internet. A port is the point admission, physical or logical, of a connection through which you transfers made between files. Nmap has infinite utility, we think that most of the vulnerabilities will find them with this small but great tool. To give some examples, Nmap allows us to know which ports are open or closed on a particular system, or to find out what the Operating System in use. The best method of doing this is to send an IP input (Internet Protocol that identifies the network) and commands that want. To start Nmap must open the console and type nmap. what Support will follow is a list of Nmap, which shows all the commands available with much of an explanation. Immediately verify which ports are open on our computer, to do so must be given as input: nmap-sS (yours_ip) and press enter ... we are our beautiful doors open waiting some nice trojan or similar. Of course this command you can do so with an ip address differently so as to identify its doors open or closed. (I remind you that you must perform these tests on the systems you have, otherwise it is a criminal offense) This small example has stimulated the appetite is not it? And believe it!

Now we'll discover how to identify the operating system of a machine.

Let us then be input: 

nmap-sS-O-V (vostro_ip) 

The-sS we saw earlier, is used to enable the O-mode OS Detection and-V will also show us a possible version of the system operating. The table below shows a 'complete list of options available. 

EXPLORE THE HOST:

  • -sL: Scanning a list. Easiest method.
  • -sP: Ping Scanning. Useful for determining whether a host is online.
  • -P0: Avoid at all switching host lookup.
  •  -PS/PA/PU [portlist]: Send TCP SYN / ACK or UDP ports indicated.
  •  -PE/PP/PM: Send pacchett standards, similar to the famous ping. 

SCANNING TECHNIQUES: 

  •  -sS/sT/sA/sW/sM: port scans in general 
  •  -sN/sF/sX: Port Scan with outptup of open and closed 
  •  - scanflags : A type of scan "custom
  • -sO: Allows you to determine which IP protocols are supported.
  • -b : Allows you to connect to an FTP server and asks, Then send the files to a different FTP server. 

SPECIFICATIONS FOR THE PORTS:

  •  -p : Scan specified ports Example:-p22;-p1- 65535;-p U: 53,111,137, T :21-25, 80,139,8080
  •  -F: Fast - Scanning only the ports listed in nmap-service
  • -r: Scanning ports consecutively

SERVICE / VERSION NOTED:

  • -sV: Check open ports to determine current services or information 
  • - version_light: Version a little 'more limited, useful for speeding up the search
  • - version_all: Try every single probe-packet on every port
  • - version_trace: Show debugging information about the activities of scanning version.

NOTED OS

  • -O: Enable OS detection 
  • -osscan_limit: Detect operating limit 
  • -osscan_guess: Guess OS more "hard"

TIMING AND PERFORMANCE: 

  • -T [0-6]: Set the model of timing (the higher the value, it's fast) 
  •  --min_hostgroup/max_hostgroup : Adjusts the size of groups for scans parallel
  • --min_parallelism/max_parallelism : Changes in parallel 
  • --min_rtt_timeout/max_rtt_timeout/initial_rtt_timeout : Edit out
  •  - host_timeout : Stop the search if the host is not respond
  •  --scan_delay/--max_scan_delay : Edit delays 

FIREWALL / IDS EVASION AND SPOOFING

  • -f, - mtu : Fragmented Packets 
  • D- : Covers a scan using bait 
  • S- : Soofing entire source 
  • -e : Use the specified interface 
  • -g/--source_port : Use the port number chosen (spoofing) 
  •  - spoof_mac : Spoofing the MAC (hardware) 

OUTPUT 

  •  -oN/-oX/-oS/-oG : Output normal, XML, Script Kiddie (XD) and grepable. 
  • -oA: Output of all sizes 
  • -v: Verbose Mode (provides more information) 
  • -d [level]: Increase levels or configure debugging 
  •  - packet_trace: Show all packets sent and received 
  •  - iflist: Show host interfaces
  •  - append_output: Queue output file 
  • - resume: Resume an aborted scan

Other:

  •  -6: Enable IPv6 scanning with 
  • -A: Enables OS detection and version detection
  •  - privileged: Assume the privileges of Total 
  • -V: Return the version of Nmap 
  • -h: Displays a list of all available commands. 

Nmap is amazing is not it? These listed above are almost all commands available (they are missing 3-4 and I have not included because I think they are not very useful). As we have seen Nmap can do everything and more, by port scanning, identification of the operating system and from circumventing MAC Spoofing the firewall, doors and more. I remind you that to know the best Nmap need lots of practice ... well as a whole, moreover, is not it?

要查看或添加评论,请登录

Ajaypal Singh Randhawa的更多文章

  • History of Botnets

    History of Botnets

    Botnets have become one of the biggest threats to security systems today. Their growing popularity among cyber…

    1 条评论
  • Wireshark

    Wireshark

    Wireshark is a tool that can analyze network protocols and to perform the so-called packet-sniffing. Packet-sniffing is…

    1 条评论
  • IEEE 802.11

    IEEE 802.11

    The IEEE is an acronym for the Institute of Electrical and Electronics Engineers. These are a bunch of scientists and…

  • Swiss-Army Knife for TCP/IP: Netcat

    Swiss-Army Knife for TCP/IP: Netcat

    Netcat, also called "the Swiss box cutter networks", is one of the most popular tool for information security. The…

  • ARP Cache Poisoning

    ARP Cache Poisoning

    In this article I will briefly describe the operation of the ARP protocol and a very well known but also very effective…

    1 条评论
  • Anatomy of a Ransomware Attack CryptoLocker, CryptoWall How to Stay Safe

    Anatomy of a Ransomware Attack CryptoLocker, CryptoWall How to Stay Safe

    Abstract — Ransomware is malware that prevents you from using your files or your computer, and then extorts money from…

社区洞察

其他会员也浏览了