nmap commands
Embed Size (px)
TRANSCRIPT
-
Nmap Commands
www.lucideus.com KAILASH KUMAR
NSIC Campus,Okhla PhaseIII Lucideus Grade2(5-7)
New Delhi-110020
http://www.lucideus.com/
-
Nmap Commands July 28, 2016
www.lucideus.com Page 1
INTRODUCTION TO NMAP
Nmap (Network Mapper) is a security scanner originally written by Gordon Lyon used to
discover hosts and services on a computer network, thus creating a "map" of the network. To
accomplish its goal, Nmap sends specially crafted packets to the target host and then analyzes the
responses.
The software provides a number of features for probing computer networks, including host
discovery and service and operating system detection. These features are extensible by scripts
that provide more advanced service detection,vulnerability detection, and other features. Nmap is
also capable of adapting to network conditions including latency and congestion during a scan.
Nmap is under development and refinement by its user community.
FEATURES AND USES OF NMAP
Nmap features include:
Host discovery Identifying hosts on a network. For example, listing the hosts that
respond to TCP and/or ICMP requests or have a particular port open.
Port scanning Enumerating the open ports on target hosts.
Version detection Interrogating network services on remote devices to determine
application name and version number.
OS detection Determining the operating system and hardware characteristics of
network devices.
Scriptable interaction with the target using Nmap Scripting Engine (NSE) and Lua
programming language.
Nmap can provide further information on targets, including reverse DNS names, device
types, and MAC addresses.
Typical uses of Nmap:
Auditing the security of a device or firewall by identifying the network connections
which can be made to, or through it.
Identifying open ports on a target host in preparation for auditing.
Network inventory, network mapping, maintenance and asset management.
Auditing the security of a network by identifying new servers.
Generating traffic to hosts on a network, response analysis and response time
measurement.
Find and exploit vulnerabilities in a network.
-
Nmap Commands July 28, 2016
www.lucideus.com Page 2
NMAP COMMANDS
1-Scan a Single Host or an IP Address
Scan a Single IP Address :
$ nmap 192.168.159.128
Scan for Host Name:
$ nmap server.shellhacks.com
-
Nmap Commands July 28, 2016
www.lucideus.com Page 3
2-Scan multiple IP Addresses
Scan multiple IP Addresses
$nmap 192.168.159.1 192.168.159.2 192.168.159.3
$nmap 192.168.159.1,2,3
Scan for Subnet:
$ nmap 192.168.159.0/24
$nmap 192.168.159.*
Scan for Ranges of IP(192.168.159.0-192.168.159.30)
-
Nmap Commands July 28, 2016
www.lucideus.com Page 4
3- Scan Network for Active computers
Scan Network for Active Host on a Network
nmap -sn 192.168.159.1/24
4- Scan a List of Host From Input File
Scan hosts/networks from Input File:
create file using command
cat > ipfile.txt
$ nmap -iL '/root/Desktop/ipfile.txt'
-
Nmap Commands July 28, 2016
www.lucideus.com Page 5
5.Exclude IP/Hosts/networks from Nmap Scan
Exclide targets from Nmap scan:
$ nmap 192.168.159.0/24 --exclude 192.168.1.128
Exclude List of hosts from a file:
$ nmap 192.168.159.0/24 --excludefile '/root/Desktop/ipfile.txt'
-
Nmap Commands July 28, 2016
www.lucideus.com Page 6
6.Scan for Specific ports
Scan for single Port:
$ nmap -p 80 192.168.159.128
Scan for all Ports:
$ nmap -p* 192.168.159.128
Scan for all Ports:
$ nmap -p* 192.168.159.128
Scan for common ports:
$ namp --top-ports 5 192.168.159.128
-
Nmap Commands July 28, 2016
www.lucideus.com Page 7
7.Determine Suppoeted IP Protocols
Determine Which IP protocols are supported by the target host:
$ nmap -sO 192.168.159.128
8.Scan For TCP/UDP Ports
Scan for all TCP ports:
$ nmap -sT 192.168.159.128
Scan for all TCP ports:
$ nmap -sU 192.168.159.128
-
Nmap Commands July 28, 2016
www.lucideus.com Page 8
9-Perform a Fast Scan
Enable Fast Mode:
$ nmap -F 192.168.159.128
10- Display the Reason a Port is in a Particular State
$ nmap --reason 192.168.159.128
-
Nmap Commands July 28, 2016
www.lucideus.com Page 9
11-Show Only Open Ports
$ namp --open 192.168.159.128
12-OS Detection
$ namp -O 192.168.159.128
-
Nmap Commands July 28, 2016
www.lucideus.com Page 10
13- Service Version Detection
$ nmap -sV 192.168.159.128
14- Firewall Detection.
$nmap -sA 192.168.159.128
15- MAC Address Spoofing
$ nmap --spoof-mac 00:11:22:33:44:55 192.168.159.128
-
Nmap Commands July 28, 2016
www.lucideus.com Page 11
$nmap --spoof-mac 0 192.168.159.128
16- scan a firewall For Security vulnerabilities
TCP Null Scan:
$ nmap -sN 192.168.159.128
TCP Fin Scan:
$ nmap -sF 192.168.159.128
TCP Xmas Scan:
$ nmap -sX 192.168.159.128
-
Nmap Commands July 28, 2016
www.lucideus.com Page 12
17-Stealth Scan
TCP SYN scan
$ nmap -sS 192.168.159.128
18-Disable Host Discovery(No Ping)
$ namp -Pn 192.168.159.128
-
Nmap Commands July 28, 2016
www.lucideus.com Page 13
19-Disable DNS Resolution
$ namp -n 192.168.159.128
20- Save Output of Nmap scan to a File
save output of Nmap scan to TEXT File
$ nmap 192.168.159.128 > output.txt
$ nmap -oN output.txt 192.168.159.128
-
Nmap Commands July 28, 2016
www.lucideus.com Page 14
save output of Nmap scan to an xml
$ nmap -oN output.txt 192.168.159.128
References
http://www.shellhacks.com/en/20-Awesome-Nmap-Command-Examples
https://nmap.org/