Nmap (Network Mapper) ဆိုတာ ဘာလဲ
ဘယ္ေနရာသံုးတာလဲ ဆိုတာေလာက္ကိုေတာ့ လိုက္ေျပာမေနေတာ့ဘူးေနာ္
သိျပီးသားျဖစ္မွာပဲလို႔
ယူဆလို႔ေလ
NMAP
can determine the
·
operating system of the target,
·
names and versions of the listening services,
·
estimated up time,
·
type of device,
·
and finally presence of a FIREWALL.
Nmap runs on Linux,Microsoft Windows,Solaris,HP-UX and BSD Linux is the most popular Nmap platform with Windows following it closely
Top Features of NMAP
Nmap features include:
Nmap runs on Linux,Microsoft Windows,Solaris,HP-UX and BSD Linux is the most popular Nmap platform with Windows following it closely
Top Features of NMAP
Nmap features include:
·
Host Discovery – Identifying hosts on a network. For example, listing
the hosts which respond to pings or have a particular port open.
·
Port Scanning – Enumerating the open ports on one or more target hosts.
·
Version Detection – Interrogating listening network
services listening on remote devices to determine the application
name and version number
·
OS Detection – Remotely determining the operating system and some
hardware characteristics of network devices.
·
Scriptable interaction with the target – using
Nmap Script Engine
Hackers COMMANDS OF NMAP
Open ur Console in backtrack/kali and type all the commands and see their working and doconnect to internet also :)
* typenmap and press enter :: to see all the commands of nmap
** Now how to scan ips in range and to see how many are alive :: command is
nmap -sP 192.168.254.0/24
*** Now how to scan ip in a specific range :: command is
nmap -sP 192.168.254.99-106
like we are scanning ip from 99 to 106
**** Now we will do stealth scan to see how many ports are open on the specific ip :: command is
nmap -sS 192.168.254.102 and press enter
***** Now to find what operating system running on the ip address :: command is
nmap -O 192.168.254.102
****** Now to scan for TCP connect :: command is
nmap -sT 192.168.254.102
******* Just a null scan to check whether ip is alive or not :: command is
nmap -sN 192.168.254.102
******** Now to scan for UDP connect :: command is
nmap -sU 192.168.254.102
********** To scan for IP Protocol :: command is
nmap -sO 192.168.254.102
*********** To check ACKNOWLEGMENT (ACK) :: command is
nmap -sA 192.168.254.102
************* To scan for which windows is running :: command is
nmap -sW 192.168.254.102
I believe that is what i know but still if i am miss some command do comment.Thank you
Hackers COMMANDS OF NMAP
Open ur Console in backtrack/kali and type all the commands and see their working and doconnect to internet also :)
* typenmap and press enter :: to see all the commands of nmap
** Now how to scan ips in range and to see how many are alive :: command is
nmap -sP 192.168.254.0/24
*** Now how to scan ip in a specific range :: command is
nmap -sP 192.168.254.99-106
like we are scanning ip from 99 to 106
**** Now we will do stealth scan to see how many ports are open on the specific ip :: command is
nmap -sS 192.168.254.102 and press enter
***** Now to find what operating system running on the ip address :: command is
nmap -O 192.168.254.102
****** Now to scan for TCP connect :: command is
nmap -sT 192.168.254.102
******* Just a null scan to check whether ip is alive or not :: command is
nmap -sN 192.168.254.102
******** Now to scan for UDP connect :: command is
nmap -sU 192.168.254.102
********** To scan for IP Protocol :: command is
nmap -sO 192.168.254.102
*********** To check ACKNOWLEGMENT (ACK) :: command is
nmap -sA 192.168.254.102
************* To scan for which windows is running :: command is
nmap -sW 192.168.254.102
I believe that is what i know but still if i am miss some command do comment.Thank you
No comments:
Post a Comment