SlideShare a Scribd company logo
1 of 9
NMAP
You’re on the network, now what?
28 Oct 2015, Kevin Alcock
NMAP - What is it?
• free and open source utility for network discovery and
security auditing
• binaries available for Linux, Windows, & Mac OS X
• It was designed to rapidly scan large networks, but
works fine against single hosts.
• uses raw IP packets in novel ways to determine what
hosts are available on the network, what services
(application name and version) those hosts are offering
NMAP
$ nmap 172.16.16.14
$ nmap 172.16.16.10-19
$ nmap 172.16.16.0/24
Default nmap TCP scan uses the 1000 most popular
ports.
see /usr/share/nmap/nmap-services
NMAP - A few options
$ nmap -sT 172.16.16.14
$ nmap -p 80 172.16.16.14
$ nmap -p 1-65535 172.16.16.14
$ nmap -v -sn 172.16.16.10-19
$ nmap -sT -A --top-ports=20 172.16.16.10-19
NMAP - A few options
-O (OS Detection)
-n (No DNS resolution)
-s <ip> (spoof source ip)
-6 (IPv6 scan)
-sV (Grab banners)
Input/Output options
-iL <file> (Input from list of hosts)
--exclude <host1[,host2][,host3],…> (Exclude hosts)
--excludefile <file> (Exclude list from file)
-oG <file> (Grepable output format)
-oX <file> (XML format)
NMAP - NSE scripts
/usr/share/nmap/scripts
--script=
ftp-proftpd-backdoor
smb-os-discovery
vnc-brute
NMAP - More Info
• http://nmap.org
• man nmap
• and google is your friend

More Related Content

What's hot

Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanOWASP Delhi
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)shwetha mk
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniquesamiable_indian
 
Scapy the packet 途中01
Scapy the packet 途中01Scapy the packet 途中01
Scapy the packet 途中01saba syake
 
Brocade - Stingray Application Firewall
Brocade - Stingray Application FirewallBrocade - Stingray Application Firewall
Brocade - Stingray Application FirewallSimon Su
 
BSides London - Scapy Workshop
BSides London - Scapy WorkshopBSides London - Scapy Workshop
BSides London - Scapy WorkshopAdam Maxwell
 
Scanning with nmap
Scanning with nmapScanning with nmap
Scanning with nmapcommiebstrd
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)SSASIT
 
OSMC 2009 | Monitoring and IPv6 by Benedikt Stockebrandt
OSMC 2009 |  Monitoring and IPv6 by Benedikt StockebrandtOSMC 2009 |  Monitoring and IPv6 by Benedikt Stockebrandt
OSMC 2009 | Monitoring and IPv6 by Benedikt StockebrandtNETWAYS
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port ScanningSam Bowne
 
Nebula container orchestrator
Nebula container orchestratorNebula container orchestrator
Nebula container orchestratorNaor Livne
 

What's hot (19)

Nmap and metasploitable
Nmap and metasploitableNmap and metasploitable
Nmap and metasploitable
 
Scapy talk
Scapy talkScapy talk
Scapy talk
 
Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit Ranjan
 
NMAP
NMAPNMAP
NMAP
 
Nmap Basics
Nmap BasicsNmap Basics
Nmap Basics
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniques
 
Scapy the packet 途中01
Scapy the packet 途中01Scapy the packet 途中01
Scapy the packet 途中01
 
CCNP Quizzes
CCNP QuizzesCCNP Quizzes
CCNP Quizzes
 
Brocade - Stingray Application Firewall
Brocade - Stingray Application FirewallBrocade - Stingray Application Firewall
Brocade - Stingray Application Firewall
 
BSides London - Scapy Workshop
BSides London - Scapy WorkshopBSides London - Scapy Workshop
BSides London - Scapy Workshop
 
Scanning with nmap
Scanning with nmapScanning with nmap
Scanning with nmap
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
OSMC 2009 | Monitoring and IPv6 by Benedikt Stockebrandt
OSMC 2009 |  Monitoring and IPv6 by Benedikt StockebrandtOSMC 2009 |  Monitoring and IPv6 by Benedikt Stockebrandt
OSMC 2009 | Monitoring and IPv6 by Benedikt Stockebrandt
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
 
Nmap tutorial
Nmap tutorialNmap tutorial
Nmap tutorial
 
Nebula container orchestrator
Nebula container orchestratorNebula container orchestrator
Nebula container orchestrator
 
Hanz and Franz
Hanz and FranzHanz and Franz
Hanz and Franz
 

Viewers also liked

Ashley O. Senior Project Photoshow
Ashley O. Senior Project PhotoshowAshley O. Senior Project Photoshow
Ashley O. Senior Project Photoshowolson126
 
Gestion del conocimiento
Gestion del conocimiento Gestion del conocimiento
Gestion del conocimiento lulamosa
 
Importancia de los controladores y uso de software de verificacion
Importancia de los controladores y uso de software de verificacionImportancia de los controladores y uso de software de verificacion
Importancia de los controladores y uso de software de verificacionnatalia590
 
Microsoft Small Business Server 2008
Microsoft Small Business Server 2008Microsoft Small Business Server 2008
Microsoft Small Business Server 2008ÇözümPARK
 
11112013 derecho a decidir. desigualdad y fragmentación
11112013 derecho a decidir. desigualdad y fragmentación11112013 derecho a decidir. desigualdad y fragmentación
11112013 derecho a decidir. desigualdad y fragmentaciónupydeuropa
 
Waldain risalat maab maa qabar kay ahkam by kokab noorani
Waldain risalat maab maa qabar kay ahkam by kokab nooraniWaldain risalat maab maa qabar kay ahkam by kokab noorani
Waldain risalat maab maa qabar kay ahkam by kokab nooraniMuhammad Tariq
 
Android mit Google Befreiung, PlayStore Apps im eigenen Repo
Android mit Google Befreiung, PlayStore Apps im eigenen RepoAndroid mit Google Befreiung, PlayStore Apps im eigenen Repo
Android mit Google Befreiung, PlayStore Apps im eigenen RepoB1 Systems GmbH
 
David Špinar: Story Telling & Cross Device
David Špinar: Story Telling & Cross DeviceDavid Špinar: Story Telling & Cross Device
David Špinar: Story Telling & Cross DeviceH1.cz
 
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi tah...
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi  tah...Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi  tah...
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi tah...Muhammad Tariq
 
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitě
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitěCopycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitě
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitěH1.cz
 
250 Fractionated radiation therapy for malignant brain tumors
250 Fractionated radiation therapy for malignant brain tumors250 Fractionated radiation therapy for malignant brain tumors
250 Fractionated radiation therapy for malignant brain tumorsNeurosurgery Vajira
 
Finding material properties
Finding material propertiesFinding material properties
Finding material propertiesalwerhane
 
Risala hurmat mazameer
Risala hurmat mazameerRisala hurmat mazameer
Risala hurmat mazameerMuhammad Tariq
 
Poslední středa: Analytika Čaje týdne (Marek Prokop)
Poslední středa: Analytika Čaje týdne (Marek Prokop) Poslední středa: Analytika Čaje týdne (Marek Prokop)
Poslední středa: Analytika Čaje týdne (Marek Prokop) H1.cz
 

Viewers also liked (15)

Ashley O. Senior Project Photoshow
Ashley O. Senior Project PhotoshowAshley O. Senior Project Photoshow
Ashley O. Senior Project Photoshow
 
Gestion del conocimiento
Gestion del conocimiento Gestion del conocimiento
Gestion del conocimiento
 
Importancia de los controladores y uso de software de verificacion
Importancia de los controladores y uso de software de verificacionImportancia de los controladores y uso de software de verificacion
Importancia de los controladores y uso de software de verificacion
 
Microsoft Small Business Server 2008
Microsoft Small Business Server 2008Microsoft Small Business Server 2008
Microsoft Small Business Server 2008
 
11112013 derecho a decidir. desigualdad y fragmentación
11112013 derecho a decidir. desigualdad y fragmentación11112013 derecho a decidir. desigualdad y fragmentación
11112013 derecho a decidir. desigualdad y fragmentación
 
Waldain risalat maab maa qabar kay ahkam by kokab noorani
Waldain risalat maab maa qabar kay ahkam by kokab nooraniWaldain risalat maab maa qabar kay ahkam by kokab noorani
Waldain risalat maab maa qabar kay ahkam by kokab noorani
 
Android mit Google Befreiung, PlayStore Apps im eigenen Repo
Android mit Google Befreiung, PlayStore Apps im eigenen RepoAndroid mit Google Befreiung, PlayStore Apps im eigenen Repo
Android mit Google Befreiung, PlayStore Apps im eigenen Repo
 
Gestão de Tempo
Gestão de TempoGestão de Tempo
Gestão de Tempo
 
David Špinar: Story Telling & Cross Device
David Špinar: Story Telling & Cross DeviceDavid Špinar: Story Telling & Cross Device
David Špinar: Story Telling & Cross Device
 
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi tah...
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi  tah...Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi  tah...
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi tah...
 
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitě
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitěCopycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitě
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitě
 
250 Fractionated radiation therapy for malignant brain tumors
250 Fractionated radiation therapy for malignant brain tumors250 Fractionated radiation therapy for malignant brain tumors
250 Fractionated radiation therapy for malignant brain tumors
 
Finding material properties
Finding material propertiesFinding material properties
Finding material properties
 
Risala hurmat mazameer
Risala hurmat mazameerRisala hurmat mazameer
Risala hurmat mazameer
 
Poslední středa: Analytika Čaje týdne (Marek Prokop)
Poslední středa: Analytika Čaje týdne (Marek Prokop) Poslední středa: Analytika Čaje týdne (Marek Prokop)
Poslední středa: Analytika Čaje týdne (Marek Prokop)
 

Similar to Discover Network Services and Hosts with NMAP

Nmap basics-1198948509608024-3
Nmap basics-1198948509608024-3Nmap basics-1198948509608024-3
Nmap basics-1198948509608024-3Harsh Desai
 
This Assignment consists of Amazon Web services
This Assignment consists of Amazon Web servicesThis Assignment consists of Amazon Web services
This Assignment consists of Amazon Web servicesMahesh688216
 
Nmap basics
Nmap basicsNmap basics
Nmap basicsitmind4u
 
Practical White Hat Hacker Training - Active Information Gathering
Practical White Hat Hacker Training - Active Information GatheringPractical White Hat Hacker Training - Active Information Gathering
Practical White Hat Hacker Training - Active Information GatheringPRISMA CSI
 
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019Nikhil Raj
 
Lab-5 Scanning and Enumeration Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration        Reconnaissance and inform.docxLab-5 Scanning and Enumeration        Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration Reconnaissance and inform.docxLaticiaGrissomzz
 
Network Mapper (NMAP)
Network Mapper (NMAP)Network Mapper (NMAP)
Network Mapper (NMAP)KHNOG
 
NMap 101 offline meetup by CyberForge Academy
NMap 101 offline meetup by CyberForge AcademyNMap 101 offline meetup by CyberForge Academy
NMap 101 offline meetup by CyberForge Academycyberforgeacademy
 
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit BasicsNetwork Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit BasicsBishop Fox
 
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...idsecconf
 
Nmap Discovery
Nmap DiscoveryNmap Discovery
Nmap DiscoveryTai Pan
 

Similar to Discover Network Services and Hosts with NMAP (20)

Zen map
Zen mapZen map
Zen map
 
Nmap basics-1198948509608024-3
Nmap basics-1198948509608024-3Nmap basics-1198948509608024-3
Nmap basics-1198948509608024-3
 
Nmap
NmapNmap
Nmap
 
This Assignment consists of Amazon Web services
This Assignment consists of Amazon Web servicesThis Assignment consists of Amazon Web services
This Assignment consists of Amazon Web services
 
Nmap
NmapNmap
Nmap
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Practical White Hat Hacker Training - Active Information Gathering
Practical White Hat Hacker Training - Active Information GatheringPractical White Hat Hacker Training - Active Information Gathering
Practical White Hat Hacker Training - Active Information Gathering
 
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
 
Lab-5 Scanning and Enumeration Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration        Reconnaissance and inform.docxLab-5 Scanning and Enumeration        Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration Reconnaissance and inform.docx
 
Network Mapper (NMAP)
Network Mapper (NMAP)Network Mapper (NMAP)
Network Mapper (NMAP)
 
NMap 101 offline meetup by CyberForge Academy
NMap 101 offline meetup by CyberForge AcademyNMap 101 offline meetup by CyberForge Academy
NMap 101 offline meetup by CyberForge Academy
 
Namp
Namp Namp
Namp
 
wireshark.pdf
wireshark.pdfwireshark.pdf
wireshark.pdf
 
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit BasicsNetwork Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
 
Network for amin
Network for aminNetwork for amin
Network for amin
 
Contents namp
Contents nampContents namp
Contents namp
 
Contents namp
Contents nampContents namp
Contents namp
 
NMAP1.ppt
NMAP1.pptNMAP1.ppt
NMAP1.ppt
 
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
 
Nmap Discovery
Nmap DiscoveryNmap Discovery
Nmap Discovery
 

Recently uploaded

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Discover Network Services and Hosts with NMAP

  • 1. NMAP You’re on the network, now what? 28 Oct 2015, Kevin Alcock
  • 2.
  • 3. NMAP - What is it? • free and open source utility for network discovery and security auditing • binaries available for Linux, Windows, & Mac OS X • It was designed to rapidly scan large networks, but works fine against single hosts. • uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering
  • 4. NMAP $ nmap 172.16.16.14 $ nmap 172.16.16.10-19 $ nmap 172.16.16.0/24 Default nmap TCP scan uses the 1000 most popular ports. see /usr/share/nmap/nmap-services
  • 5. NMAP - A few options $ nmap -sT 172.16.16.14 $ nmap -p 80 172.16.16.14 $ nmap -p 1-65535 172.16.16.14 $ nmap -v -sn 172.16.16.10-19 $ nmap -sT -A --top-ports=20 172.16.16.10-19
  • 6. NMAP - A few options -O (OS Detection) -n (No DNS resolution) -s <ip> (spoof source ip) -6 (IPv6 scan) -sV (Grab banners)
  • 7. Input/Output options -iL <file> (Input from list of hosts) --exclude <host1[,host2][,host3],…> (Exclude hosts) --excludefile <file> (Exclude list from file) -oG <file> (Grepable output format) -oX <file> (XML format)
  • 8. NMAP - NSE scripts /usr/share/nmap/scripts --script= ftp-proftpd-backdoor smb-os-discovery vnc-brute
  • 9. NMAP - More Info • http://nmap.org • man nmap • and google is your friend