Introduction of NMAP Network Mapper

Introduction to NSA
Advance Network Scanning
Introduction to Metasploit Framework
Search and Add Exploit
————————————–

NSA –> Network Security Analysis

5 phases of hacking
===================
1. Information Gathering
2. Scanning
3. Gaining Access
4. Maintaining Access
5. Covering Traces

Information Gathering
———————
1. Target Specific
2. Network Specific

Network Specific Information Gathering
======================================
IP Address
Socets
Ports
MAC Address
…..
…..

1. Normal Information Gathering
2. Advanced | Intelligent Information Gathering

1. Normal Information Gathering
——————————-
Number of Devices Connected
IP Address Allocated
MAC Address
Vendor Name

Tools
=====
arp-scan
#arp-scan –local
netdiscover
#netdiscover -r 192.168.0.1/24 -i wlan0

2. Advanced | Intelligent Information Gathering
===============================================
In this type of information gathering, we will get very minute and granular information about the target in the network.
IP Address
MAC Address
Ports
Services
Version
Vendor
Operating System
Operating System Version
Operating System Family
Protocol

Tools
=====
nmap
zenmap

NMAP –> Network Mapper
=======================
Network exporation and discovery tool, which helps us in gathering the informartion about a network and a target website too. It was designed to scan the large networks but it also works perfectly fine for smaller networks.
It is CLI (command line interface) based tool

Types of Scan
=============

1. Network Specific Scan
#nmap 192.168.0.1-255
#nmap 192.168.0.1/24

STATE –> 1. OPEN
2. CLOSED
3. FILTERED
FILTERED|OPEN
FILTERED|CLOSED

2. Target Specific scan
#nmap <IP Address Of The Target>

3. Agressive Scan
#nmap -A -T4 <IP Address Of The Target>
A –> Agressive Scan
T –> Time Duration between sending 2 consecutive packet
4 –> 4 unit of time(sec)

4. Service Detection Scan
#nmap -sS 192.168.0.189
s –> Script
S –> Service Detection

5. Version Detection Scan
#nmap -sV <IP Address>

6. Minute Details
#nmap -sC <IP Address>

7. Combined Scan
#nmap -sS -sC -sV <IP Address>

8. Port Specific Scan
#nmap 192.168.0.181 -p80,3306
#nmap 192.168.0.181 -p80-3306

9. Firewall Scan
#nmap -f <IP Address>
#nmap <IP Address> -Pn
#nmap <IP Address> -Pn -p80,3306
#nmap –script firewall-bypass <target>

10. Vulnerability Scan
#nmap –script vuln 192.168.0.101

11. Operating System Detection Scan
#nmap 192.168.0.101 -O

12. To scan a website
#nmap <website domain name>

ZENMAP —> Twin Brother of NMAP, but it is GUI Based.

Flags
=====
1. ACK –> Acknowledgement
2. SYN –> Synchronization
3. FIN –> Finish
4. RST –> Reset
5. PSH –> Push
6. URG –> Urgent

3 comments on “Introduction of NMAP Network Mapper
  1. Hi there! This is my first visit to your blog! We are a team of volunteers and starting a new project in a community in the same niche. Your blog provided us useful information to work on. You have done a outstanding job!

  2. Marty Guizar says:

    Hello! I just would like to give a huge thumbs up for the great info you have here on this post. I will be coming back to your blog for more soon.

  3. I cannot thank you enough for the blog post.Really looking forward to read more. Awesome.

Leave a Reply

Your email address will not be published. Required fields are marked *

*