Getting started with NMAP (Network Mapper)

Written by akshat-srivastava | Published 2020/08/26
Tech Story Tags: port-scanning | nmap | network-mapper | security | open-source | latest | network-security | founder-of-nmap

TLDR Nmap (Network Mapper) is a free and open-source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks like network inventory, managing services upgrade schedules, and monitoring host or service uptime. Nmap runs on all major computer OS and officially binary packages are available for Linux, Windows, and Mac OS. It is the most powerful tool to scan the ports of the target.com and Google.com ports.via the TL;DR App

“The quieter you become the more you are able to hear”

NMAP

Nmap (Network Mapper) is a free and open-source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks like network inventory, managing services upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine that what host are available on the network, what service those hosts are offering, what OS they’re using, what variety of packet filters/firewalls are in use and dozens of other characteristics. It had been designed to rapidly scan large networks, but works fine against the single host. Nmap runs on all major computer OS and officially binary packages are available for Linux, Windows, and Mac OS.

Founder of Nmap

Gordon Lyon (also known by his pseudonym Fyodor Vaskovich) is a network security expert. Lyon created Nmap, and has written numerous books.He is a founding member of the Honeynet Project and was Vice President of Computer Professionals for Social Responsibility.

Installing Nmap in Linux OS

To install Nmap in your Linux OS
type: sudo apt -get nmap
or you can visit https://nmap.org/ to install.

Scanning ping for active host.

type: nmap -sP [IP range]
-sP: to scan ping
If you don’t know your IP address type: ifconfig and copy your IP address.
scanning IP 127.0.0.1

Checking out the open ports of Target.

type: nmap -sS -A [Target]
sS: used for port scanning.
-A: used for OS version detection.
Port Scanning and OS version detection.

Checking out the open ports of Google.com

port scanning of Google.com
In the above screenshot you can see port 80/tcp and 443/tcp are an open port of Google.com and 998 are filtered ports (protected by a firewall).
TCP: Transmission control protocol.
UDP: User datagram protocol.
Type: nmap -p 0–65535 -sV -O -sS -T4 162.210.102.212
-p: to scan port between 0 to 65535.
-sV: to scan the Service version.
-O: for OS detection.

Conclusion

I hope you liked my short and simple article and learned a lot on port scanning which is the basics for information gathering and also the initial step to start the hack.
It is the most powerful tool to scan the ports of the target.
Email:- adaksh5@gmail.com



Written by akshat-srivastava | Avid coder and a technical writer
Published by HackerNoon on 2020/08/26