SlideShare a Scribd company logo
2
Most read
3
Most read
19
Most read
Network Scanning and Port Scanning
Tool
-Pritesh Raka
 Introduction
 Overview
 Why NMAp?
 Primary uses of NMAP
 Basic NMAP Functions
 Host Detection
 Port Scanning
 Port States
 Port Scanning Techniques
 OS Detection
 Anatomy of NMAP Argument
 NMAP Using RedHat
 NMAP Using Windows
 Latest Releases
 NMAP = Network Mapper
 Nmap is and an Open Source utility which can quickly
scan broad ranges of devices and provide valuable
information about the devices on your network.It can
be used for IT auditing and asset discovery as well as
security profiling of the network.
 Nmap is a tool used for determining the hosts that are
running and what services the hosts are running.
 Originally developed by Gorden Lyon(Fyodor).
 Released in September 1997 stable version in 23 Aug
2014 , NMAP v6.47.
 Written in c,c++,Python. It is Cross Platform.
 Website http://nmap.org
 What Does NMAP do?
 NMAP uses raw IP packets to determine what
hosts are available on the network , the
services that are enabled, the operating
system and version of the host, what sort of
firewall and packet filters are in place and
many other aspects of the network.
 The Information can be used both proactively
to identify and correct security holes and by
attackers to perform reconnaissance about the
types and quantities of targets available and
what weaknesses exists.
 Nmap can use Syn/XMas/NULL scan in a
speed where you can see nowhere else .0 The
Nmap suite includes an advanced GUI and
results viewer (Zenmap ), a flexible data
transfer, redirection, and debugging tool
(Ncat ), a utility for comparing scan results
(Ndiff ), and a packet generation and response
analysis tool (Nping ). Nmap was named
“Security Product of the Year” by Linux
Journal, Info World, LinuxQuestions.Org, and
Codetalker Digest. It was even featured in
eight movies , including The Matrix Reloaded
, Die Hard 4 , and The Bourne Ultimatum.
 1. Determining open ports and services
running in an host:
 2. Determine the Operating System running
on a host
 3. Alter the source IP of the scan (One way is
to use –S option)
 4.Scriptable Interaction with the target- using
Nmap Scripting Engine(NSE)
 Host discovery
-Which Hosts are up(IP Addresses)
-Ping Scans
 Port Scanning
-Which ports of the target host have servers
listening on them
-Allows a guess of software and services a
machine is running
 OS Detection
-OS Detection/OS Fingerprinting
 What is Host Detection?
 Host detection is a feature of Nmap that tells it to
further analyze what the packet behavior is, and
asses what operating system the target host is
Based on.
 What is Version Detection?
 Version detection Expands on host detection by
also querying the ports Nmap finds open for what
the service is.
 How does Nmap identifies host?
 Nmap by default will perform either TCP SYN or
TCP Connect Ping to gather active hosts. In some
cases Nmap will even use ARP pinging to identify
hosts as well.
 The act of testing a remote port to know in
which state it is.
 •Common port states:
–Open,
–Closed,
–and Filtered
 Scan Displays
-Service Name
-Port Number
-Port State
-Protocol
 Open
 Will Accept connections
 Closed
 Host is up, but no services running on the port
 Filtered
 Firewall or other network obstacle is covering port
 Unfiltered or Closed
 Port is accessible but Determined to be closed
with no obstacle or interface
 -most common case
 •TCP SYN or Stealth Scan (-sS)
 •TCP Connect Scan (-sT)
 •TCP ACK Scan (-sA)
 •UDP Scan (-sU)
 •TCP FIN Scan (-sF)
 •TCP NULL Scan (-sN)
 •XMAS Tree Scan(-sX)
 •Custom Scan (--scanflags)
 •IP Protocol Scan (-sO)
 •Bounce Attack[ftp] (-b)
In third part of scanning Nmap also detects the type OS run
by the Host. With the use of OS Fingerprinting.
 nmap –sS-PO –O –p 1-1024 192.168.1.*
 -s = Scan type
 -P = Ping Type
 -O = Optional os detection
 -p #-# = port range
 Id Range: 192.168.1.0/24,192.168.1.1-254
 -O = os detection
 -sV = Service Detection
-allports
-Version intensity<intensity>(set version
scan intensity)
-F = Fast Scan(0-1024)
-r = don’t randomize ports
-6 = IPV6 scanning enable
-A = Aggressive scan option(-O,-sV,-traceroute)
 Nmap is available for wide range of Operating
System platforms. The standard download is a
UNIX version.(Which runs on Linux, Solaris
,free/Net/Open BSD and Mac OS X) And the
windows version Nmap as well Recommended
GUI Zenmap.
 Information on Nmap can be obtained from
the manual pages of Redhat using the
command ‘man nmap’.
 Open a terminal and type “nmapfe” to access
the front end of nmap.
 To Run Nmap on windows The two important
files to be installed are as follows:
 a) Nmap-<version>-win32.zip
 b) WinPcap 3.0 stable version. (WinPcap is the
packet capture library for Nmap).
 There is more User friendly version Available
for us With GUI known ass Zenmap.
NMap
NMap
NMap
 Nmap 6.49BETA2
 Nmap 6.49BETA1
 Nmap 6.40
 Nmap 6.25
 Now available with 100’s of new OS and
version detection and with Gopher protocol
Support.
NMap
Thank You…!

More Related Content

PPTX
Network Penetration Testing
Mohammed Adam
 
PDF
Nmap basics
itmind4u
 
PPTX
Understanding NMAP
Phannarith Ou, G-CISO
 
PPTX
NMAP
PrateekAryan1
 
PDF
Nmap commands
Kailash Kumar
 
PPT
Port scanning
Hemanth Pasumarthi
 
Network Penetration Testing
Mohammed Adam
 
Nmap basics
itmind4u
 
Understanding NMAP
Phannarith Ou, G-CISO
 
Nmap commands
Kailash Kumar
 
Port scanning
Hemanth Pasumarthi
 

What's hot (20)

PPTX
NMAP - The Network Scanner
n|u - The Open Security Community
 
PPTX
Nmap
Megha Sahu
 
PDF
Nmap Basics
amiable_indian
 
PPTX
Recon with Nmap
OWASP Delhi
 
ODP
Scanning with nmap
commiebstrd
 
PPTX
N map presentation
ulirraptor
 
PDF
Hacking With Nmap - Scanning Techniques
amiable_indian
 
PPTX
Nmap(network mapping)
shwetha mk
 
PPTX
Nmap and metasploitable
Mohammed Akbar Shariff
 
PPTX
Metasploit
Lalith Sai
 
PPTX
Nessus-Vulnerability Tester
Aditya Jain
 
PPTX
Introduction to penetration testing
Nezar Alazzabi
 
PPTX
Wireshark Basic Presentation
MD. SHORIFUL ISLAM
 
PPTX
Introduction To Exploitation & Metasploit
Raghav Bisht
 
PDF
Nessus Software
Megha Sahu
 
PPTX
Metasploit framwork
Deepanshu Gajbhiye
 
PPTX
Wireshark
Sourav Roy
 
PPTX
Netcat - A Swiss Army Tool
Chandrapal Badshah
 
PPTX
Zen map
harisnaved
 
NMAP - The Network Scanner
n|u - The Open Security Community
 
Nmap Basics
amiable_indian
 
Recon with Nmap
OWASP Delhi
 
Scanning with nmap
commiebstrd
 
N map presentation
ulirraptor
 
Hacking With Nmap - Scanning Techniques
amiable_indian
 
Nmap(network mapping)
shwetha mk
 
Nmap and metasploitable
Mohammed Akbar Shariff
 
Metasploit
Lalith Sai
 
Nessus-Vulnerability Tester
Aditya Jain
 
Introduction to penetration testing
Nezar Alazzabi
 
Wireshark Basic Presentation
MD. SHORIFUL ISLAM
 
Introduction To Exploitation & Metasploit
Raghav Bisht
 
Nessus Software
Megha Sahu
 
Metasploit framwork
Deepanshu Gajbhiye
 
Wireshark
Sourav Roy
 
Netcat - A Swiss Army Tool
Chandrapal Badshah
 
Zen map
harisnaved
 
Ad

Similar to NMap (20)

PDF
NMap 101 offline meetup by CyberForge Academy
cyberforgeacademy
 
PPT
NMAP1.ppt
DakshKhurana15
 
PDF
O PODER DO NMAP ATRAVÉS DE SEUS COMANDOS.pdf
Maicon Wendhausen
 
PDF
Nmap basics-1198948509608024-3
Harsh Desai
 
PDF
A COMPREHENSIVE ANALYSIS OF NETWORK SCANNING AND SECURITY ASSESSMENT TOOL
IJNSA Journal
 
PDF
nmap-150817055204-lva1-app6891_٠٩٥٩٣٥ (1).pdf
mah902110
 
DOCX
Contents namp
shwetha mk
 
DOCX
Contents namp
shwetha mk
 
DOCX
This Assignment consists of Amazon Web services
Mahesh688216
 
PDF
Network Mapper (NMAP)
KHNOG
 
PPTX
Using metasploit
CyberRad
 
PPTX
Nmap
NishaYadav177
 
PDF
Nmap | Network Mapping | Null Bhopal Chapter
Yugansh Holani
 
PDF
Complete Nmap Scanning Commands CheatSheet by Hackopedia Utkarsh Thakur
Hackopedia Utkarsh Thakur
 
PDF
Practical White Hat Hacker Training - Active Information Gathering
PRISMA CSI
 
PDF
Nmap Hacking Guide
Aryan G
 
PPT
01204427-scanner.ppt
VarunBehere1
 
PPTX
Null Delhi chapter - Feb 2019
Nikhil Raj
 
PPTX
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Boston Institute of Analytics
 
NMap 101 offline meetup by CyberForge Academy
cyberforgeacademy
 
NMAP1.ppt
DakshKhurana15
 
O PODER DO NMAP ATRAVÉS DE SEUS COMANDOS.pdf
Maicon Wendhausen
 
Nmap basics-1198948509608024-3
Harsh Desai
 
A COMPREHENSIVE ANALYSIS OF NETWORK SCANNING AND SECURITY ASSESSMENT TOOL
IJNSA Journal
 
nmap-150817055204-lva1-app6891_٠٩٥٩٣٥ (1).pdf
mah902110
 
Contents namp
shwetha mk
 
Contents namp
shwetha mk
 
This Assignment consists of Amazon Web services
Mahesh688216
 
Network Mapper (NMAP)
KHNOG
 
Using metasploit
CyberRad
 
Nmap | Network Mapping | Null Bhopal Chapter
Yugansh Holani
 
Complete Nmap Scanning Commands CheatSheet by Hackopedia Utkarsh Thakur
Hackopedia Utkarsh Thakur
 
Practical White Hat Hacker Training - Active Information Gathering
PRISMA CSI
 
Nmap Hacking Guide
Aryan G
 
01204427-scanner.ppt
VarunBehere1
 
Null Delhi chapter - Feb 2019
Nikhil Raj
 
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Boston Institute of Analytics
 
Ad

Recently uploaded (20)

PDF
Immersive experiences: what Pharo users do!
ESUG
 
PPTX
slidesgo-unlocking-the-code-the-dynamic-dance-of-variables-and-constants-2024...
kr2589474
 
PPTX
Web Testing.pptx528278vshbuqffqhhqiwnwuq
studylike474
 
PDF
New Download FL Studio Crack Full Version [Latest 2025]
imang66g
 
PDF
Key Features to Look for in Arizona App Development Services
Net-Craft.com
 
PDF
49785682629390197565_LRN3014_Migrating_the_Beast.pdf
Abilash868456
 
PPTX
ASSIGNMENT_1[1][1][1][1][1] (1) variables.pptx
kr2589474
 
DOCX
Can You Build Dashboards Using Open Source Visualization Tool.docx
Varsha Nayak
 
PDF
49784907924775488180_LRN2959_Data_Pump_23ai.pdf
Abilash868456
 
PPTX
Presentation about Database and Database Administrator
abhishekchauhan86963
 
PDF
WatchTraderHub - Watch Dealer software with inventory management and multi-ch...
WatchDealer Pavel
 
PDF
vAdobe Premiere Pro 2025 (v25.2.3.004) Crack Pre-Activated Latest
imang66g
 
PPTX
classification of computer and basic part of digital computer
ravisinghrajpurohit3
 
PPTX
AI-Ready Handoff: Auto-Summaries & Draft Emails from MQL to Slack in One Flow
bbedford2
 
PPTX
Can You Build Dashboards Using Open Source Visualization Tool.pptx
Varsha Nayak
 
PDF
Salesforce Implementation Services Provider.pdf
VALiNTRY360
 
PDF
Balancing Resource Capacity and Workloads with OnePlan – Avoid Overloading Te...
OnePlan Solutions
 
PPTX
Presentation about variables and constant.pptx
kr2589474
 
PDF
Exploring AI Agents in Process Industries
amoreira6
 
PDF
Adobe Illustrator Crack Full Download (Latest Version 2025) Pre-Activated
imang66g
 
Immersive experiences: what Pharo users do!
ESUG
 
slidesgo-unlocking-the-code-the-dynamic-dance-of-variables-and-constants-2024...
kr2589474
 
Web Testing.pptx528278vshbuqffqhhqiwnwuq
studylike474
 
New Download FL Studio Crack Full Version [Latest 2025]
imang66g
 
Key Features to Look for in Arizona App Development Services
Net-Craft.com
 
49785682629390197565_LRN3014_Migrating_the_Beast.pdf
Abilash868456
 
ASSIGNMENT_1[1][1][1][1][1] (1) variables.pptx
kr2589474
 
Can You Build Dashboards Using Open Source Visualization Tool.docx
Varsha Nayak
 
49784907924775488180_LRN2959_Data_Pump_23ai.pdf
Abilash868456
 
Presentation about Database and Database Administrator
abhishekchauhan86963
 
WatchTraderHub - Watch Dealer software with inventory management and multi-ch...
WatchDealer Pavel
 
vAdobe Premiere Pro 2025 (v25.2.3.004) Crack Pre-Activated Latest
imang66g
 
classification of computer and basic part of digital computer
ravisinghrajpurohit3
 
AI-Ready Handoff: Auto-Summaries & Draft Emails from MQL to Slack in One Flow
bbedford2
 
Can You Build Dashboards Using Open Source Visualization Tool.pptx
Varsha Nayak
 
Salesforce Implementation Services Provider.pdf
VALiNTRY360
 
Balancing Resource Capacity and Workloads with OnePlan – Avoid Overloading Te...
OnePlan Solutions
 
Presentation about variables and constant.pptx
kr2589474
 
Exploring AI Agents in Process Industries
amoreira6
 
Adobe Illustrator Crack Full Download (Latest Version 2025) Pre-Activated
imang66g
 

NMap

  • 1. Network Scanning and Port Scanning Tool -Pritesh Raka
  • 2.  Introduction  Overview  Why NMAp?  Primary uses of NMAP  Basic NMAP Functions  Host Detection  Port Scanning  Port States  Port Scanning Techniques  OS Detection  Anatomy of NMAP Argument  NMAP Using RedHat  NMAP Using Windows  Latest Releases
  • 3.  NMAP = Network Mapper  Nmap is and an Open Source utility which can quickly scan broad ranges of devices and provide valuable information about the devices on your network.It can be used for IT auditing and asset discovery as well as security profiling of the network.  Nmap is a tool used for determining the hosts that are running and what services the hosts are running.  Originally developed by Gorden Lyon(Fyodor).  Released in September 1997 stable version in 23 Aug 2014 , NMAP v6.47.  Written in c,c++,Python. It is Cross Platform.  Website http://nmap.org
  • 4.  What Does NMAP do?  NMAP uses raw IP packets to determine what hosts are available on the network , the services that are enabled, the operating system and version of the host, what sort of firewall and packet filters are in place and many other aspects of the network.  The Information can be used both proactively to identify and correct security holes and by attackers to perform reconnaissance about the types and quantities of targets available and what weaknesses exists.
  • 5.  Nmap can use Syn/XMas/NULL scan in a speed where you can see nowhere else .0 The Nmap suite includes an advanced GUI and results viewer (Zenmap ), a flexible data transfer, redirection, and debugging tool (Ncat ), a utility for comparing scan results (Ndiff ), and a packet generation and response analysis tool (Nping ). Nmap was named “Security Product of the Year” by Linux Journal, Info World, LinuxQuestions.Org, and Codetalker Digest. It was even featured in eight movies , including The Matrix Reloaded , Die Hard 4 , and The Bourne Ultimatum.
  • 6.  1. Determining open ports and services running in an host:  2. Determine the Operating System running on a host  3. Alter the source IP of the scan (One way is to use –S option)  4.Scriptable Interaction with the target- using Nmap Scripting Engine(NSE)
  • 7.  Host discovery -Which Hosts are up(IP Addresses) -Ping Scans  Port Scanning -Which ports of the target host have servers listening on them -Allows a guess of software and services a machine is running  OS Detection -OS Detection/OS Fingerprinting
  • 8.  What is Host Detection?  Host detection is a feature of Nmap that tells it to further analyze what the packet behavior is, and asses what operating system the target host is Based on.  What is Version Detection?  Version detection Expands on host detection by also querying the ports Nmap finds open for what the service is.  How does Nmap identifies host?  Nmap by default will perform either TCP SYN or TCP Connect Ping to gather active hosts. In some cases Nmap will even use ARP pinging to identify hosts as well.
  • 9.  The act of testing a remote port to know in which state it is.  •Common port states: –Open, –Closed, –and Filtered  Scan Displays -Service Name -Port Number -Port State -Protocol
  • 10.  Open  Will Accept connections  Closed  Host is up, but no services running on the port  Filtered  Firewall or other network obstacle is covering port  Unfiltered or Closed  Port is accessible but Determined to be closed with no obstacle or interface  -most common case
  • 11.  •TCP SYN or Stealth Scan (-sS)  •TCP Connect Scan (-sT)  •TCP ACK Scan (-sA)  •UDP Scan (-sU)  •TCP FIN Scan (-sF)  •TCP NULL Scan (-sN)  •XMAS Tree Scan(-sX)  •Custom Scan (--scanflags)  •IP Protocol Scan (-sO)  •Bounce Attack[ftp] (-b)
  • 12. In third part of scanning Nmap also detects the type OS run by the Host. With the use of OS Fingerprinting.
  • 13.  nmap –sS-PO –O –p 1-1024 192.168.1.*  -s = Scan type  -P = Ping Type  -O = Optional os detection  -p #-# = port range  Id Range: 192.168.1.0/24,192.168.1.1-254
  • 14.  -O = os detection  -sV = Service Detection -allports -Version intensity<intensity>(set version scan intensity) -F = Fast Scan(0-1024) -r = don’t randomize ports -6 = IPV6 scanning enable -A = Aggressive scan option(-O,-sV,-traceroute)
  • 15.  Nmap is available for wide range of Operating System platforms. The standard download is a UNIX version.(Which runs on Linux, Solaris ,free/Net/Open BSD and Mac OS X) And the windows version Nmap as well Recommended GUI Zenmap.
  • 16.  Information on Nmap can be obtained from the manual pages of Redhat using the command ‘man nmap’.  Open a terminal and type “nmapfe” to access the front end of nmap.
  • 17.  To Run Nmap on windows The two important files to be installed are as follows:  a) Nmap-<version>-win32.zip  b) WinPcap 3.0 stable version. (WinPcap is the packet capture library for Nmap).  There is more User friendly version Available for us With GUI known ass Zenmap.
  • 21.  Nmap 6.49BETA2  Nmap 6.49BETA1  Nmap 6.40  Nmap 6.25  Now available with 100’s of new OS and version detection and with Gopher protocol Support.