NMAP
Vaibhav Ruparel

NMAP

  • What is Nmap?

-> Nmap is short for Network Mapper. It is an open-source Linux command-line tool that is used to scan IP addresses and ports in a network and to detect installed applications. Nmap allows network admins to find which devices are running on their network, discover open ports and services, and detect vulnerabilities.

  • Why to use Nmap?

-> Nmap helps you to quickly map out a network without sophisticated commands or configurations. It also supports simple commands and complex scripting through the Nmap scripting engine.

  • What are the types of Scanning?

-> 01) Basic Scan

02) Stealth Scan

03) OS Scan

04) Version Scan

05) Aggressive Scan

06) Port Scan







VAPT

Cybersecurity and Infrastructure Security Agency

National Security Agency

Cybersecurity

Network Intelligence

Datasec

DefenseStorm

CompFuber

Dr. Nilesh R Wankhade

Slytherin EduTech Pvt. Ltd.

Laxmi Narayan Sahu

Sadiya B.

Digital Security

Roshan Burnwal al

DROP Organization

Digital Forensics Corporation

Digital Forensics Now Podcast

digital.security

#thankyou

要查看或添加评论,请登录

Vaibhav Ruparel的更多文章

  • DARK WEB

    DARK WEB

    What is the Dark Web? --> The Dark web is not just the sites you can access using Google. In fact, that is just a tiny…

  • DEEP WEB

    DEEP WEB

    What is Deep Web? --> Deep web, a part of the Internet that extends beyond the reach of search engines such as Google…

  • SURFACE WEB

    SURFACE WEB

    What is Surface Web? -> Surface web is the normal web which it is visible for all users using internet. The websites in…

  • RANSOMWARE ATTACK

    RANSOMWARE ATTACK

    What is Ransomware Attack? -> Ransomware is a type of malware that locks a victim’s data or device and threatens to…

  • DDoS ATTACK

    DDoS ATTACK

    What is Dos / DDos Attack? -> DDoS Attack means "Distributed Denial-of-Service (DDoS) Attack" and it is a cybercrime in…

  • PHISHING ATTACK

    PHISHING ATTACK

    What is Phishing attack -> Phishing attacks are the practice of sending fraudulent communications that appear to come…

    1 条评论
  • OWASP

    OWASP

    What is OWASP? -> OWASP (Open Web Application Security Project) is a nonprofit organization that provides open-source…

  • CIA TRIAD

    CIA TRIAD

    What is CIA Triad? -> The three letters in "CIA triad" stand for Confidentiality, Integrity, and Availability. The CIA…

  • MALWARE

    MALWARE

    What is Malware? -> Malware is developed as harmful software that invades or corrupts your computer network. The goal…

  • CYBER EXTORTION

    CYBER EXTORTION

    What is Cyber Extortion? -> Cyber extortion is a crime involving an attack or threat of an attack coupled with a demand…

社区洞察

其他会员也浏览了