SlideShare a Scribd company logo
1 of 9
Download to read offline
NMAP
You’re on the network, now what?
28 Oct 2015, Kevin Alcock
NMAP - What is it?
• free and open source utility for network discovery and
security auditing
• binaries available for Linux, Windows, & Mac OS X
• It was designed to rapidly scan large networks, but
works fine against single hosts.
• uses raw IP packets in novel ways to determine what
hosts are available on the network, what services
(application name and version) those hosts are offering
NMAP
$ nmap 172.16.16.14
$ nmap 172.16.16.10-19
$ nmap 172.16.16.0/24
Default nmap TCP scan uses the 1000 most popular
ports.
see /usr/share/nmap/nmap-services
NMAP - A few options
$ nmap -sT 172.16.16.14
$ nmap -p 80 172.16.16.14
$ nmap -p 1-65535 172.16.16.14
$ nmap -v -sn 172.16.16.10-19
$ nmap -sT -A --top-ports=20 172.16.16.10-19
NMAP - A few options
-O (OS Detection)
-n (No DNS resolution)
-s <ip> (spoof source ip)
-6 (IPv6 scan)
-sV (Grab banners)
Input/Output options
-iL <file> (Input from list of hosts)
--exclude <host1[,host2][,host3],…> (Exclude hosts)
--excludefile <file> (Exclude list from file)
-oG <file> (Grepable output format)
-oX <file> (XML format)
NMAP - NSE scripts
/usr/share/nmap/scripts
--script=
ftp-proftpd-backdoor
smb-os-discovery
vnc-brute
NMAP - More Info
• http://nmap.org
• man nmap
• and google is your friend

More Related Content

What's hot

Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanOWASP Delhi
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)shwetha mk
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniquesamiable_indian
 
Scapy the packet 途中01
Scapy the packet 途中01Scapy the packet 途中01
Scapy the packet 途中01saba syake
 
Brocade - Stingray Application Firewall
Brocade - Stingray Application FirewallBrocade - Stingray Application Firewall
Brocade - Stingray Application FirewallSimon Su
 
BSides London - Scapy Workshop
BSides London - Scapy WorkshopBSides London - Scapy Workshop
BSides London - Scapy WorkshopAdam Maxwell
 
Scanning with nmap
Scanning with nmapScanning with nmap
Scanning with nmapcommiebstrd
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)SSASIT
 
OSMC 2009 | Monitoring and IPv6 by Benedikt Stockebrandt
OSMC 2009 |  Monitoring and IPv6 by Benedikt StockebrandtOSMC 2009 |  Monitoring and IPv6 by Benedikt Stockebrandt
OSMC 2009 | Monitoring and IPv6 by Benedikt StockebrandtNETWAYS
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port ScanningSam Bowne
 
Nebula container orchestrator
Nebula container orchestratorNebula container orchestrator
Nebula container orchestratorNaor Livne
 

What's hot (19)

Nmap and metasploitable
Nmap and metasploitableNmap and metasploitable
Nmap and metasploitable
 
Scapy talk
Scapy talkScapy talk
Scapy talk
 
Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit Ranjan
 
NMAP
NMAPNMAP
NMAP
 
Nmap Basics
Nmap BasicsNmap Basics
Nmap Basics
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniques
 
Scapy the packet 途中01
Scapy the packet 途中01Scapy the packet 途中01
Scapy the packet 途中01
 
CCNP Quizzes
CCNP QuizzesCCNP Quizzes
CCNP Quizzes
 
Brocade - Stingray Application Firewall
Brocade - Stingray Application FirewallBrocade - Stingray Application Firewall
Brocade - Stingray Application Firewall
 
BSides London - Scapy Workshop
BSides London - Scapy WorkshopBSides London - Scapy Workshop
BSides London - Scapy Workshop
 
Scanning with nmap
Scanning with nmapScanning with nmap
Scanning with nmap
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
OSMC 2009 | Monitoring and IPv6 by Benedikt Stockebrandt
OSMC 2009 |  Monitoring and IPv6 by Benedikt StockebrandtOSMC 2009 |  Monitoring and IPv6 by Benedikt Stockebrandt
OSMC 2009 | Monitoring and IPv6 by Benedikt Stockebrandt
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
 
Nmap tutorial
Nmap tutorialNmap tutorial
Nmap tutorial
 
Nebula container orchestrator
Nebula container orchestratorNebula container orchestrator
Nebula container orchestrator
 
Hanz and Franz
Hanz and FranzHanz and Franz
Hanz and Franz
 

Viewers also liked

Ashley O. Senior Project Photoshow
Ashley O. Senior Project PhotoshowAshley O. Senior Project Photoshow
Ashley O. Senior Project Photoshowolson126
 
Gestion del conocimiento
Gestion del conocimiento Gestion del conocimiento
Gestion del conocimiento lulamosa
 
Importancia de los controladores y uso de software de verificacion
Importancia de los controladores y uso de software de verificacionImportancia de los controladores y uso de software de verificacion
Importancia de los controladores y uso de software de verificacionnatalia590
 
Microsoft Small Business Server 2008
Microsoft Small Business Server 2008Microsoft Small Business Server 2008
Microsoft Small Business Server 2008ÇözümPARK
 
11112013 derecho a decidir. desigualdad y fragmentación
11112013 derecho a decidir. desigualdad y fragmentación11112013 derecho a decidir. desigualdad y fragmentación
11112013 derecho a decidir. desigualdad y fragmentaciónupydeuropa
 
Waldain risalat maab maa qabar kay ahkam by kokab noorani
Waldain risalat maab maa qabar kay ahkam by kokab nooraniWaldain risalat maab maa qabar kay ahkam by kokab noorani
Waldain risalat maab maa qabar kay ahkam by kokab nooraniMuhammad Tariq
 
Android mit Google Befreiung, PlayStore Apps im eigenen Repo
Android mit Google Befreiung, PlayStore Apps im eigenen RepoAndroid mit Google Befreiung, PlayStore Apps im eigenen Repo
Android mit Google Befreiung, PlayStore Apps im eigenen RepoB1 Systems GmbH
 
David Špinar: Story Telling & Cross Device
David Špinar: Story Telling & Cross DeviceDavid Špinar: Story Telling & Cross Device
David Špinar: Story Telling & Cross DeviceH1.cz
 
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi tah...
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi  tah...Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi  tah...
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi tah...Muhammad Tariq
 
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitě
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitěCopycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitě
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitěH1.cz
 
250 Fractionated radiation therapy for malignant brain tumors
250 Fractionated radiation therapy for malignant brain tumors250 Fractionated radiation therapy for malignant brain tumors
250 Fractionated radiation therapy for malignant brain tumorsNeurosurgery Vajira
 
Finding material properties
Finding material propertiesFinding material properties
Finding material propertiesalwerhane
 
Risala hurmat mazameer
Risala hurmat mazameerRisala hurmat mazameer
Risala hurmat mazameerMuhammad Tariq
 
Poslední středa: Analytika Čaje týdne (Marek Prokop)
Poslední středa: Analytika Čaje týdne (Marek Prokop) Poslední středa: Analytika Čaje týdne (Marek Prokop)
Poslední středa: Analytika Čaje týdne (Marek Prokop) H1.cz
 

Viewers also liked (15)

Ashley O. Senior Project Photoshow
Ashley O. Senior Project PhotoshowAshley O. Senior Project Photoshow
Ashley O. Senior Project Photoshow
 
Gestion del conocimiento
Gestion del conocimiento Gestion del conocimiento
Gestion del conocimiento
 
Importancia de los controladores y uso de software de verificacion
Importancia de los controladores y uso de software de verificacionImportancia de los controladores y uso de software de verificacion
Importancia de los controladores y uso de software de verificacion
 
Microsoft Small Business Server 2008
Microsoft Small Business Server 2008Microsoft Small Business Server 2008
Microsoft Small Business Server 2008
 
11112013 derecho a decidir. desigualdad y fragmentación
11112013 derecho a decidir. desigualdad y fragmentación11112013 derecho a decidir. desigualdad y fragmentación
11112013 derecho a decidir. desigualdad y fragmentación
 
Waldain risalat maab maa qabar kay ahkam by kokab noorani
Waldain risalat maab maa qabar kay ahkam by kokab nooraniWaldain risalat maab maa qabar kay ahkam by kokab noorani
Waldain risalat maab maa qabar kay ahkam by kokab noorani
 
Android mit Google Befreiung, PlayStore Apps im eigenen Repo
Android mit Google Befreiung, PlayStore Apps im eigenen RepoAndroid mit Google Befreiung, PlayStore Apps im eigenen Repo
Android mit Google Befreiung, PlayStore Apps im eigenen Repo
 
Gestão de Tempo
Gestão de TempoGestão de Tempo
Gestão de Tempo
 
David Špinar: Story Telling & Cross Device
David Špinar: Story Telling & Cross DeviceDavid Špinar: Story Telling & Cross Device
David Špinar: Story Telling & Cross Device
 
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi tah...
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi  tah...Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi  tah...
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi tah...
 
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitě
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitěCopycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitě
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitě
 
250 Fractionated radiation therapy for malignant brain tumors
250 Fractionated radiation therapy for malignant brain tumors250 Fractionated radiation therapy for malignant brain tumors
250 Fractionated radiation therapy for malignant brain tumors
 
Finding material properties
Finding material propertiesFinding material properties
Finding material properties
 
Risala hurmat mazameer
Risala hurmat mazameerRisala hurmat mazameer
Risala hurmat mazameer
 
Poslední středa: Analytika Čaje týdne (Marek Prokop)
Poslední středa: Analytika Čaje týdne (Marek Prokop) Poslední středa: Analytika Čaje týdne (Marek Prokop)
Poslední středa: Analytika Čaje týdne (Marek Prokop)
 

Similar to Discover Network Services and Hosts with NMAP

Nmap basics-1198948509608024-3
Nmap basics-1198948509608024-3Nmap basics-1198948509608024-3
Nmap basics-1198948509608024-3Harsh Desai
 
This Assignment consists of Amazon Web services
This Assignment consists of Amazon Web servicesThis Assignment consists of Amazon Web services
This Assignment consists of Amazon Web servicesMahesh688216
 
Nmap basics
Nmap basicsNmap basics
Nmap basicsitmind4u
 
Practical White Hat Hacker Training - Active Information Gathering
Practical White Hat Hacker Training - Active Information GatheringPractical White Hat Hacker Training - Active Information Gathering
Practical White Hat Hacker Training - Active Information GatheringPRISMA CSI
 
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019Nikhil Raj
 
Lab-5 Scanning and Enumeration Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration        Reconnaissance and inform.docxLab-5 Scanning and Enumeration        Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration Reconnaissance and inform.docxLaticiaGrissomzz
 
Network Mapper (NMAP)
Network Mapper (NMAP)Network Mapper (NMAP)
Network Mapper (NMAP)KHNOG
 
NMap 101 offline meetup by CyberForge Academy
NMap 101 offline meetup by CyberForge AcademyNMap 101 offline meetup by CyberForge Academy
NMap 101 offline meetup by CyberForge Academycyberforgeacademy
 
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit BasicsNetwork Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit BasicsBishop Fox
 
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...idsecconf
 
Nmap Discovery
Nmap DiscoveryNmap Discovery
Nmap DiscoveryTai Pan
 

Similar to Discover Network Services and Hosts with NMAP (20)

Zen map
Zen mapZen map
Zen map
 
Nmap basics-1198948509608024-3
Nmap basics-1198948509608024-3Nmap basics-1198948509608024-3
Nmap basics-1198948509608024-3
 
Nmap
NmapNmap
Nmap
 
This Assignment consists of Amazon Web services
This Assignment consists of Amazon Web servicesThis Assignment consists of Amazon Web services
This Assignment consists of Amazon Web services
 
Nmap
NmapNmap
Nmap
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Practical White Hat Hacker Training - Active Information Gathering
Practical White Hat Hacker Training - Active Information GatheringPractical White Hat Hacker Training - Active Information Gathering
Practical White Hat Hacker Training - Active Information Gathering
 
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
 
Lab-5 Scanning and Enumeration Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration        Reconnaissance and inform.docxLab-5 Scanning and Enumeration        Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration Reconnaissance and inform.docx
 
Network Mapper (NMAP)
Network Mapper (NMAP)Network Mapper (NMAP)
Network Mapper (NMAP)
 
NMap 101 offline meetup by CyberForge Academy
NMap 101 offline meetup by CyberForge AcademyNMap 101 offline meetup by CyberForge Academy
NMap 101 offline meetup by CyberForge Academy
 
Namp
Namp Namp
Namp
 
wireshark.pdf
wireshark.pdfwireshark.pdf
wireshark.pdf
 
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit BasicsNetwork Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
 
Network for amin
Network for aminNetwork for amin
Network for amin
 
Contents namp
Contents nampContents namp
Contents namp
 
Contents namp
Contents nampContents namp
Contents namp
 
NMAP1.ppt
NMAP1.pptNMAP1.ppt
NMAP1.ppt
 
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
 
Nmap Discovery
Nmap DiscoveryNmap Discovery
Nmap Discovery
 

Recently uploaded

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 

Recently uploaded (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 

Discover Network Services and Hosts with NMAP

  • 1. NMAP You’re on the network, now what? 28 Oct 2015, Kevin Alcock
  • 2.
  • 3. NMAP - What is it? • free and open source utility for network discovery and security auditing • binaries available for Linux, Windows, & Mac OS X • It was designed to rapidly scan large networks, but works fine against single hosts. • uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering
  • 4. NMAP $ nmap 172.16.16.14 $ nmap 172.16.16.10-19 $ nmap 172.16.16.0/24 Default nmap TCP scan uses the 1000 most popular ports. see /usr/share/nmap/nmap-services
  • 5. NMAP - A few options $ nmap -sT 172.16.16.14 $ nmap -p 80 172.16.16.14 $ nmap -p 1-65535 172.16.16.14 $ nmap -v -sn 172.16.16.10-19 $ nmap -sT -A --top-ports=20 172.16.16.10-19
  • 6. NMAP - A few options -O (OS Detection) -n (No DNS resolution) -s <ip> (spoof source ip) -6 (IPv6 scan) -sV (Grab banners)
  • 7. Input/Output options -iL <file> (Input from list of hosts) --exclude <host1[,host2][,host3],…> (Exclude hosts) --excludefile <file> (Exclude list from file) -oG <file> (Grepable output format) -oX <file> (XML format)
  • 8. NMAP - NSE scripts /usr/share/nmap/scripts --script= ftp-proftpd-backdoor smb-os-discovery vnc-brute
  • 9. NMAP - More Info • http://nmap.org • man nmap • and google is your friend