In this post we are going to learn about n map commands.
Network security is very important if hackers access your network so they can do many many malicious activities such as sniffing, session hijacking, also hack your computer systems which are connected to the network and also perform DOS attacks.
An open-source vulnerability scanner, Nmap is a free, free tool for scanning networks and finding vulnerabilities. A network administrator uses Nmap to identify what devices are running on their systems, find out what services are available from each host and identify open ports.
The Nmap tool can monitor both single hosts as well as large networks that contain hundreds of thousands of devices and tens of thousands of subnets.
Pentesters and ethical hackers use Nmap to scan networks and identify weaknesses. It also supports a wide variety of scripts that can be run to scan for vulnerability, brute force attacks, DoS attacks, http scanning, and so on.
Nmap scans each and every port, for example, firewall, is listening for responses and determining whether ports are open, closed or filtered. Port enumeration and discovery are other terms for port scanning.
Click here to know more bout Nmap commands.
In the ethical hacking phase, NMAP commands is used for scanning. The scanning is part of the third phase, and it was very important to run NMAP during this phase.
Basic Nmap Commands:
1] Port Scanning
Command: nmap example.com
You can have multiple domains or IP
Command: nmap example1.com example2.com example3.com.
You can use this command to scan ports on your network. You will put a website or IP address
2] Scan All 65,535 Ports In The Network.
Command: nmap -p- example.com
You can use this command to scan 65535 ports on your network. You will put a website or IP address.
3] Aggressive Scan
Command: nmap -A example.com
You can use this command to scan Aggressive. You can gather versions, banner, port information, OS information and so on. You will put a website or IP address.
4] Ping Scan
Command: nmap -sP example.com
There is an extensive list of NMAP commands. If you want to use Nmap for ping scanning, several examples can be listed
There are several ways to execute port scanning using Nmap. The most commonly used are these:
# sS TCP SYN scan
# sT TCP connect scan
# sU UDP scans
# sY SCTP INIT scan
# sN TCP NULL
5] Scanning IP Range
Command: nmap 192.168.3.0/24
The first thing you should do is check your IP address with ifconfig and set the range to 0/23 to scan all the IP addresses connected to your network. Also, check the website's IP address to find more IP addresses.
6] Scanning Vulnerability Using Nmap Script
Command: nmap --script=vuln example.com
Nmap use various scripts. This script is used to scan for vulnerabilities on your target.
7] Scanning Single Port
Command: nmap -p 80 example.com
This command is used to scan a single port in a network you can target and scan a specific port using this command
8] Operating System Scanning
Command: nmap -O example.com
This command is use to scan operating system in network. This command is shows guessing and in rare case they show actual target OS it is depending upon systems to systems.
9] Save Nmap Scanning Report In TXT File
Command: nmap -oN result.txt example.com
This command is use to save your scanning results.
10] Scan Using Default Safe Scripts
Command: nmap -sC -sV example.com
Using this command you can scan default safe scripts
In addition to protecting your system from hackers, Nmap allows you to detect any security vulnerabilities within your network. However, whether or not port scans on external servers are legal is another issue altogether. This is a complex area of law that varies by territory. Make sure you research the legal aspects of using Nmap before you start scanning external ports widely. Using Nmap to scan external ports could result in your ISP banning you, so make sure you research all possibilities before you start using it.
So, this was everything about nmap commands, now if you like this tutorial then must share it with your friends and needy one.
If you want to learn ethical hacking or a penetration testing visit our website https://cyberbugs.in/courses
Cyberbugs is a best cyber security courses training provider in Nagpur,India and other native countries
By Abhishek joshi
CyberBugs