Wednesday, January 1, 2014

KALI ဟက္ကာ မ်ားအတြက္ NMAP COMMANDS ေလးေတြ ရွယ္ေပးလိုက္ပါတယ္ (BACKTRACK USERS)







Nmap (Network Mapper) ဆိုတာ ဘာလဲ ဘယ္ေနရာသံုးတာလဲ ဆိုတာေလာက္ကိုေတာ့ လိုက္ေျပာမေနေတာ့ဘူးေနာ္ 
သိျပီးသားျဖစ္မွာပဲလို႔ ယူဆလို႔ေလ


NMAP can determine the 
·  operating system of the target,
·  names and versions of the listening services,
·  estimated up time,
·  type of device,
·  and finally presence of a FIREWALL.

Nmap runs on Linux,Microsoft Windows,Solaris,HP-UX and BSD Linux is the most popular Nmap platform with Windows following it closely

Top Features of NMAP 

Nmap features include:
·  Host Discovery – Identifying hosts on a network. For example, listing the hosts which respond to pings or have a particular port open.
·  Port Scanning – Enumerating the open ports on one or more target hosts.
·  Version Detection – Interrogating listening network services listening on remote devices to determine the application name and version number
·  OS Detection – Remotely determining the operating system and some hardware characteristics of network devices.
·  Scriptable interaction with the target – using Nmap Script Engine


Hackers COMMANDS OF NMAP


Open ur Console in backtrack/kali and type all the commands and see their working and doconnect to internet also :)

* typenmap and press enter :: to see all the commands of nmap

** Now how to scan ips in range and to see how many are alive :: command is

nmap -sP 192.168.254.0/24

*** Now how to scan ip in a specific range :: command is

nmap -sP 192.168.254.99-106

like we are scanning ip from 99 to 106

**** Now we will do stealth scan to see how many ports are open on the specific ip :: command is

nmap -sS 192.168.254.102 and press enter

***** Now to find what operating system running on the ip address :: command is

nmap -O 192.168.254.102

****** Now to scan for TCP connect :: command is

nmap -sT 192.168.254.102

******* Just a null scan to check whether ip is alive or not :: command is

nmap -sN 192.168.254.102
******** Now to scan for UDP connect :: command is

nmap -sU 192.168.254.102

********** To scan for IP Protocol :: command is

nmap -sO 192.168.254.102

*********** To check ACKNOWLEGMENT (ACK) :: command is

nmap -sA 192.168.254.102

************* To scan for which windows is running :: command is

nmap -sW 192.168.254.102

I believe that is what i know but still if i am miss some command do comment.Thank you

No comments:

Post a Comment