SlideShare a Scribd company logo
1 of 9
NMAP
You’re on the network, now what?
28 Oct 2015, Kevin Alcock
NMAP - What is it?
• free and open source utility for network discovery and
security auditing
• binaries available for Linux, Windows, & Mac OS X
• It was designed to rapidly scan large networks, but
works fine against single hosts.
• uses raw IP packets in novel ways to determine what
hosts are available on the network, what services
(application name and version) those hosts are offering
NMAP
$ nmap 172.16.16.14
$ nmap 172.16.16.10-19
$ nmap 172.16.16.0/24
Default nmap TCP scan uses the 1000 most popular
ports.
see /usr/share/nmap/nmap-services
NMAP - A few options
$ nmap -sT 172.16.16.14
$ nmap -p 80 172.16.16.14
$ nmap -p 1-65535 172.16.16.14
$ nmap -v -sn 172.16.16.10-19
$ nmap -sT -A --top-ports=20 172.16.16.10-19
NMAP - A few options
-O (OS Detection)
-n (No DNS resolution)
-s <ip> (spoof source ip)
-6 (IPv6 scan)
-sV (Grab banners)
Input/Output options
-iL <file> (Input from list of hosts)
--exclude <host1[,host2][,host3],…> (Exclude hosts)
--excludefile <file> (Exclude list from file)
-oG <file> (Grepable output format)
-oX <file> (XML format)
NMAP - NSE scripts
/usr/share/nmap/scripts
--script=
ftp-proftpd-backdoor
smb-os-discovery
vnc-brute
NMAP - More Info
• http://nmap.org
• man nmap
• and google is your friend

More Related Content

What's hot

Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanOWASP Delhi
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)shwetha mk
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniquesamiable_indian
 
Scapy the packet 途中01
Scapy the packet 途中01Scapy the packet 途中01
Scapy the packet 途中01saba syake
 
Brocade - Stingray Application Firewall
Brocade - Stingray Application FirewallBrocade - Stingray Application Firewall
Brocade - Stingray Application FirewallSimon Su
 
BSides London - Scapy Workshop
BSides London - Scapy WorkshopBSides London - Scapy Workshop
BSides London - Scapy WorkshopAdam Maxwell
 
Scanning with nmap
Scanning with nmapScanning with nmap
Scanning with nmapcommiebstrd
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)SSASIT
 
OSMC 2009 | Monitoring and IPv6 by Benedikt Stockebrandt
OSMC 2009 |  Monitoring and IPv6 by Benedikt StockebrandtOSMC 2009 |  Monitoring and IPv6 by Benedikt Stockebrandt
OSMC 2009 | Monitoring and IPv6 by Benedikt StockebrandtNETWAYS
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port ScanningSam Bowne
 
Nebula container orchestrator
Nebula container orchestratorNebula container orchestrator
Nebula container orchestratorNaor Livne
 

What's hot (19)

Nmap and metasploitable
Nmap and metasploitableNmap and metasploitable
Nmap and metasploitable
 
Scapy talk
Scapy talkScapy talk
Scapy talk
 
Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit Ranjan
 
NMAP
NMAPNMAP
NMAP
 
Nmap Basics
Nmap BasicsNmap Basics
Nmap Basics
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniques
 
Scapy the packet 途中01
Scapy the packet 途中01Scapy the packet 途中01
Scapy the packet 途中01
 
CCNP Quizzes
CCNP QuizzesCCNP Quizzes
CCNP Quizzes
 
Brocade - Stingray Application Firewall
Brocade - Stingray Application FirewallBrocade - Stingray Application Firewall
Brocade - Stingray Application Firewall
 
BSides London - Scapy Workshop
BSides London - Scapy WorkshopBSides London - Scapy Workshop
BSides London - Scapy Workshop
 
Scanning with nmap
Scanning with nmapScanning with nmap
Scanning with nmap
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
OSMC 2009 | Monitoring and IPv6 by Benedikt Stockebrandt
OSMC 2009 |  Monitoring and IPv6 by Benedikt StockebrandtOSMC 2009 |  Monitoring and IPv6 by Benedikt Stockebrandt
OSMC 2009 | Monitoring and IPv6 by Benedikt Stockebrandt
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
 
Nmap tutorial
Nmap tutorialNmap tutorial
Nmap tutorial
 
Nebula container orchestrator
Nebula container orchestratorNebula container orchestrator
Nebula container orchestrator
 
Hanz and Franz
Hanz and FranzHanz and Franz
Hanz and Franz
 

Viewers also liked

Ashley O. Senior Project Photoshow
Ashley O. Senior Project PhotoshowAshley O. Senior Project Photoshow
Ashley O. Senior Project Photoshowolson126
 
Gestion del conocimiento
Gestion del conocimiento Gestion del conocimiento
Gestion del conocimiento lulamosa
 
Importancia de los controladores y uso de software de verificacion
Importancia de los controladores y uso de software de verificacionImportancia de los controladores y uso de software de verificacion
Importancia de los controladores y uso de software de verificacionnatalia590
 
Microsoft Small Business Server 2008
Microsoft Small Business Server 2008Microsoft Small Business Server 2008
Microsoft Small Business Server 2008ÇözümPARK
 
11112013 derecho a decidir. desigualdad y fragmentación
11112013 derecho a decidir. desigualdad y fragmentación11112013 derecho a decidir. desigualdad y fragmentación
11112013 derecho a decidir. desigualdad y fragmentaciónupydeuropa
 
Waldain risalat maab maa qabar kay ahkam by kokab noorani
Waldain risalat maab maa qabar kay ahkam by kokab nooraniWaldain risalat maab maa qabar kay ahkam by kokab noorani
Waldain risalat maab maa qabar kay ahkam by kokab nooraniMuhammad Tariq
 
Android mit Google Befreiung, PlayStore Apps im eigenen Repo
Android mit Google Befreiung, PlayStore Apps im eigenen RepoAndroid mit Google Befreiung, PlayStore Apps im eigenen Repo
Android mit Google Befreiung, PlayStore Apps im eigenen RepoB1 Systems GmbH
 
David Špinar: Story Telling & Cross Device
David Špinar: Story Telling & Cross DeviceDavid Špinar: Story Telling & Cross Device
David Špinar: Story Telling & Cross DeviceH1.cz
 
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi tah...
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi  tah...Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi  tah...
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi tah...Muhammad Tariq
 
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitě
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitěCopycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitě
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitěH1.cz
 
250 Fractionated radiation therapy for malignant brain tumors
250 Fractionated radiation therapy for malignant brain tumors250 Fractionated radiation therapy for malignant brain tumors
250 Fractionated radiation therapy for malignant brain tumorsNeurosurgery Vajira
 
Finding material properties
Finding material propertiesFinding material properties
Finding material propertiesalwerhane
 
Risala hurmat mazameer
Risala hurmat mazameerRisala hurmat mazameer
Risala hurmat mazameerMuhammad Tariq
 
Poslední středa: Analytika Čaje týdne (Marek Prokop)
Poslední středa: Analytika Čaje týdne (Marek Prokop) Poslední středa: Analytika Čaje týdne (Marek Prokop)
Poslední středa: Analytika Čaje týdne (Marek Prokop) H1.cz
 

Viewers also liked (15)

Ashley O. Senior Project Photoshow
Ashley O. Senior Project PhotoshowAshley O. Senior Project Photoshow
Ashley O. Senior Project Photoshow
 
Gestion del conocimiento
Gestion del conocimiento Gestion del conocimiento
Gestion del conocimiento
 
Importancia de los controladores y uso de software de verificacion
Importancia de los controladores y uso de software de verificacionImportancia de los controladores y uso de software de verificacion
Importancia de los controladores y uso de software de verificacion
 
Microsoft Small Business Server 2008
Microsoft Small Business Server 2008Microsoft Small Business Server 2008
Microsoft Small Business Server 2008
 
11112013 derecho a decidir. desigualdad y fragmentación
11112013 derecho a decidir. desigualdad y fragmentación11112013 derecho a decidir. desigualdad y fragmentación
11112013 derecho a decidir. desigualdad y fragmentación
 
Waldain risalat maab maa qabar kay ahkam by kokab noorani
Waldain risalat maab maa qabar kay ahkam by kokab nooraniWaldain risalat maab maa qabar kay ahkam by kokab noorani
Waldain risalat maab maa qabar kay ahkam by kokab noorani
 
Android mit Google Befreiung, PlayStore Apps im eigenen Repo
Android mit Google Befreiung, PlayStore Apps im eigenen RepoAndroid mit Google Befreiung, PlayStore Apps im eigenen Repo
Android mit Google Befreiung, PlayStore Apps im eigenen Repo
 
Gestão de Tempo
Gestão de TempoGestão de Tempo
Gestão de Tempo
 
David Špinar: Story Telling & Cross Device
David Špinar: Story Telling & Cross DeviceDavid Špinar: Story Telling & Cross Device
David Špinar: Story Telling & Cross Device
 
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi tah...
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi  tah...Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi  tah...
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi tah...
 
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitě
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitěCopycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitě
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitě
 
250 Fractionated radiation therapy for malignant brain tumors
250 Fractionated radiation therapy for malignant brain tumors250 Fractionated radiation therapy for malignant brain tumors
250 Fractionated radiation therapy for malignant brain tumors
 
Finding material properties
Finding material propertiesFinding material properties
Finding material properties
 
Risala hurmat mazameer
Risala hurmat mazameerRisala hurmat mazameer
Risala hurmat mazameer
 
Poslední středa: Analytika Čaje týdne (Marek Prokop)
Poslední středa: Analytika Čaje týdne (Marek Prokop) Poslední středa: Analytika Čaje týdne (Marek Prokop)
Poslední středa: Analytika Čaje týdne (Marek Prokop)
 

Similar to Christchurch ISIG 27 oct2015

Nmap basics-1198948509608024-3
Nmap basics-1198948509608024-3Nmap basics-1198948509608024-3
Nmap basics-1198948509608024-3Harsh Desai
 
This Assignment consists of Amazon Web services
This Assignment consists of Amazon Web servicesThis Assignment consists of Amazon Web services
This Assignment consists of Amazon Web servicesMahesh688216
 
Nmap basics
Nmap basicsNmap basics
Nmap basicsitmind4u
 
Practical White Hat Hacker Training - Active Information Gathering
Practical White Hat Hacker Training - Active Information GatheringPractical White Hat Hacker Training - Active Information Gathering
Practical White Hat Hacker Training - Active Information GatheringPRISMA CSI
 
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019Nikhil Raj
 
Lab-5 Scanning and Enumeration Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration        Reconnaissance and inform.docxLab-5 Scanning and Enumeration        Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration Reconnaissance and inform.docxLaticiaGrissomzz
 
Network Mapper (NMAP)
Network Mapper (NMAP)Network Mapper (NMAP)
Network Mapper (NMAP)KHNOG
 
NMap 101 offline meetup by CyberForge Academy
NMap 101 offline meetup by CyberForge AcademyNMap 101 offline meetup by CyberForge Academy
NMap 101 offline meetup by CyberForge Academycyberforgeacademy
 
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit BasicsNetwork Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit BasicsBishop Fox
 
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...idsecconf
 
Nmap Discovery
Nmap DiscoveryNmap Discovery
Nmap DiscoveryTai Pan
 

Similar to Christchurch ISIG 27 oct2015 (20)

Zen map
Zen mapZen map
Zen map
 
Nmap basics-1198948509608024-3
Nmap basics-1198948509608024-3Nmap basics-1198948509608024-3
Nmap basics-1198948509608024-3
 
Nmap
NmapNmap
Nmap
 
This Assignment consists of Amazon Web services
This Assignment consists of Amazon Web servicesThis Assignment consists of Amazon Web services
This Assignment consists of Amazon Web services
 
Nmap
NmapNmap
Nmap
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Practical White Hat Hacker Training - Active Information Gathering
Practical White Hat Hacker Training - Active Information GatheringPractical White Hat Hacker Training - Active Information Gathering
Practical White Hat Hacker Training - Active Information Gathering
 
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
 
Lab-5 Scanning and Enumeration Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration        Reconnaissance and inform.docxLab-5 Scanning and Enumeration        Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration Reconnaissance and inform.docx
 
Network Mapper (NMAP)
Network Mapper (NMAP)Network Mapper (NMAP)
Network Mapper (NMAP)
 
NMap 101 offline meetup by CyberForge Academy
NMap 101 offline meetup by CyberForge AcademyNMap 101 offline meetup by CyberForge Academy
NMap 101 offline meetup by CyberForge Academy
 
Namp
Namp Namp
Namp
 
wireshark.pdf
wireshark.pdfwireshark.pdf
wireshark.pdf
 
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit BasicsNetwork Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
 
Network for amin
Network for aminNetwork for amin
Network for amin
 
Contents namp
Contents nampContents namp
Contents namp
 
Contents namp
Contents nampContents namp
Contents namp
 
NMAP1.ppt
NMAP1.pptNMAP1.ppt
NMAP1.ppt
 
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
 
Nmap Discovery
Nmap DiscoveryNmap Discovery
Nmap Discovery
 

Recently uploaded

API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 

Recently uploaded (20)

API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 

Christchurch ISIG 27 oct2015

  • 1. NMAP You’re on the network, now what? 28 Oct 2015, Kevin Alcock
  • 2.
  • 3. NMAP - What is it? • free and open source utility for network discovery and security auditing • binaries available for Linux, Windows, & Mac OS X • It was designed to rapidly scan large networks, but works fine against single hosts. • uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering
  • 4. NMAP $ nmap 172.16.16.14 $ nmap 172.16.16.10-19 $ nmap 172.16.16.0/24 Default nmap TCP scan uses the 1000 most popular ports. see /usr/share/nmap/nmap-services
  • 5. NMAP - A few options $ nmap -sT 172.16.16.14 $ nmap -p 80 172.16.16.14 $ nmap -p 1-65535 172.16.16.14 $ nmap -v -sn 172.16.16.10-19 $ nmap -sT -A --top-ports=20 172.16.16.10-19
  • 6. NMAP - A few options -O (OS Detection) -n (No DNS resolution) -s <ip> (spoof source ip) -6 (IPv6 scan) -sV (Grab banners)
  • 7. Input/Output options -iL <file> (Input from list of hosts) --exclude <host1[,host2][,host3],…> (Exclude hosts) --excludefile <file> (Exclude list from file) -oG <file> (Grepable output format) -oX <file> (XML format)
  • 8. NMAP - NSE scripts /usr/share/nmap/scripts --script= ftp-proftpd-backdoor smb-os-discovery vnc-brute
  • 9. NMAP - More Info • http://nmap.org • man nmap • and google is your friend