Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Nmap(network mapping)


Published on


Published in: Education
  • Be the first to comment

Nmap(network mapping)

  1. 1. Deeksha Poornashri(1MS13IS141) Shantha Madiwalar(1MS14IS413) Shakunthala B V(1MS14IS412) Greeshma R J(1MS13IS142) NMAP(NETWORK MAPPING)
  2. 2. TABLE OF CONTENTS Introduction  History Features Uses Future and Ethical issues
  3. 3. INTRODUCTION  Nmap is a security scanner originally written by Gordon Lyon used discover hosts and sevices on a computer network thus creating a “map” of the network.  To accomplish its goals , Nmap sends specially crafted packets to the target host and then analyzes the responses.  Nmap(“Network Mapper”) is a free and open source utility for network exploration and security auditing.  Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services those services are offering, what operating systems they are running.
  4. 4. HISTORY  Nmap was first published in September 1997, as an article in Phrack Magazine with source code included.  With help and contributions of computer security community, development continued.  Enhancements included operating system fingerprinting, service fingerprinting, code rewrites, additional scan types, protocol support and new programs that complement Nmap’s core features.  12 December 1998, Nmap 2.00 is released, including Operating System fingerprinting.  After that, many versions of Nmap was released.
  5. 5. FEATURES  Host discovery - Identifying hosts on a network.  Port scanning – Enumerating the open ports on target hosts.  Version detection – Interrogating network services on remote devices to determine application name and version number.  OS detection – Determine the operating system and hardware characteristics of network devices.  Scriptable interaction with the target – using Nmap Scripting Engine and Lua programming language.  Nmap can provide further information on targets, including reverse DNS names, device types, and MAC addresses.
  6. 6. USES OF NMAP  Auditing the security of a device or firewall by identifying the network connections which can be made to, or through it.  Identifying open ports on a target host in preparation for auditing.  Network inventory, network mapping, maintenance and asset management.  Auditing the security of a network by identifying new servers.  Generating the traffic to hosts on a network.  Find and exploit vulnerabilities in a network.
  7. 7. FUTURE AND ETHICAL ISSUES  10 years plan is up in the air, nmap do have plans and guiding priorities for the next several years. Few of them are : o Nmap Scripting Engine o Scanning web sites o Web infrastructure improvements o Online scanning web service Nmap is a tool that can be used to discover services running on Internet connected systems. Like any tool it could potentially be used for black hat hacking, as a precursor to attempts to gain unauthorized access to computer systems. Nmap is more often used by security and systems administration to assess networks for vulnerabilities. In some jurisdictions, unauthorized port scanning is illegal.