Thursday, 1 May 2014

Nmap Scanning Tutorial

Nmap Scanning Tutorial




Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing. Nmap is a perfect scanning tool for hackers out there and boy..they use it extensively.Many systems and network administratorsNMAP running on Windows XP command promptalso find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime .I will be discussing about how to do simple scanning in Nmap.

Here is how to do that

[1] Start by downloading the version of nmap from here . Net Tools also contain the NMAP scanner.
Windows users, install nmap by extracting the contents of the downloaded file to the C:\WINDOWS\system32directory.  Linux or Unix geeks can install nmap by extracting the source code to a directory, changing to that directory, and typing " ./configure ", "make", and "make install", all from a command-line terminal.

[2] Now Open a command terminal. On Windows, do this by going to

Start >Programs >Accessories> Command Prompt

On Linux, simply use the terminal open from when you installed nmap.
Change directories to where you saved nmap by typing: "cd [wherever you saved nmap]". You must enter it in a specific format or the command will not work. For instance, to change to My Documents, you would type:

cd C:\Users\Me\My Documents

[3] Run a simple ping scan, which will simply say "Hello! Are you connected? " to each computer you specify. Type

nmap -vv -sS [target]

The target can be a domain (www.microsoft.com), an IP address (127.0.0.1), a network (192.168.1.0/24), or a file containing any combination of the above. nmap will discover the IP address of the target if it wasn't given, and immediately ping the target, returning the results, which it prints to the screen.

[4] Lets Try a SYN Stealth scan. This type of scan will try to knock on all of the "doors" of the computer and see if anyone answers. To run a SYN Stealth scan, type

nmap -vv -sS [target]

The -sS switch tells nmap that we want a SYN Stealth scan. nmap will now get the IP address(es) as before, then ping the target to make sure that it is alive. However, instead of stopping there, nmap will now start asking to make a connection to the computer on each "door" or "port" that it has, 1-65535. When the computer opens the door, nmap tears down the connection and reports that the port is open. Once it is finished, it will report its results to you.scanning using NMAP
Run another SYN scan, but this time, add the " -oX target.xml " switch onto the end. This will output nmap's results to an XML file, viewable in any web browser. The only problem with this is that you need to hunt for the file if you placed it in your system32 directory.

Tips
  • Is your target not responding? Then try adding the " -P0 " switch to your scan. This will force nmap to start the scan, even if it thinks that the target doesn't exist and this is useful if the computer is blocked by a firewall.
  • Wondering how the scan is going? View nmap's progress by hitting the spacebar or any other key.
  • If your scan is taking forever to complete (think twenty minutes or more), try adding the "-F " switch to the nmap scan to have nmap scan only the most frequently used ports.
Keep In Mind
  • Make sure that you have permission to scan the target! Scanning www.FBI.gov is just asking for trouble. If you want a target to scan, try scanme.nmap.org. This is a test computer set up by the author of nmap, free to scan without getting yelled at.
  • If you frequently run nmap scans, be prepared to answer questions from your ISP (Internet Service Provider). Some ISPs routinely look for nmap traffic, and nmap isn't exactly the most inconspicuous tool. nmap is very well-known tool, and one that is used by hackers, so you may have a little explaining to do.

I hope that was informative.

Related Posts:

  • Website Hacking Using DVWA Learn Website Hacking Using DVWA Hello Everyone today We are talking about DVWA is a Application which can help you to hack website and lots of fun.  With lots of curious readers asking me how to practice hac… Read More
  • Cheap Web Hosting Providers by Uni Web Solutions The companies offering services at a cheap rate are not preferred by the people due to the mentality that they won't be providing a good quality service but it is totally wrong because the main reason they offer cheap hosti… Read More
  • stream live tv free (aajfm) Live Broadcast Of TV Channels Hello Every One This is An Post About live TV aaj Fm Just Created A live Web TV For Over Listeners this is just for Over people Who Mostly prefer to Watch TV Then They Are board I we Though why… Read More
  • call on any mobile number for free How TO make Call On Any Mobile number For free Mobile hack to call your friends:  Make Free Phone Calls From PC to mobile for free. How To Call Your Friends From THeir Own Cell Number.1. Go to http://ww… Read More
  • 20 Movies Every Hacker Should See 20 Movies Every Hacker Should See Last week we did a post on five of the most well known hackers.  Several of them had stories that were intriguing enough that the entertainment industry created books and movie… Read More

0 comments:

Post a Comment