Nmap is a network exploration tool that collects information about target hosts including open ports, services, OS detection, and running scripts. It offers various host discovery techniques like ICMP ping, TCP and UDP ping to find active systems on the network. Once hosts are identified, nmap performs port scanning using TCP SYN, ACK, and UDP scans to determine open and closed ports. It can also detect services, versions, and OS on each host. Nmap scripts provide additional information gathering capabilities for vulnerabilities and exploits.
Nmap (Network Mapper} is and an Open Source utility which can quickly scan broad ranges of devices and provide valuable information about the devices on your network.It can be used for IT auditing and asset discovery as well as security profiling of the network.
Nmap (Network Mapper} is and an Open Source utility which can quickly scan broad ranges of devices and provide valuable information about the devices on your network.It can be used for IT auditing and asset discovery as well as security profiling of the network.
www.lifein01.com - for more info
Nmap uses raw IP packets in novel ways to determine what
hosts are available on the network,
services (application name and version) those hosts are offering,
operating systems (and OS versions) they are running,
type of packet filters/firewalls are in use, and dozens of other characteristics.
The Slides deck contains Network penetration testing requirements & Tools used in real world pentesting. For Demo purposes, I had used a vulnhub machine called Metasploitable 2 for testing purposes. Looking into various Ports and Services Vulnerabilities using Kali open source tools.
About Port Scanning
Used Nmap and Shadow Security scanner for the best outputs.
A Detailed description on performing the port scanning mostly for the network administrators.
Why to perform? How to perform? Where to perform? these areas are taken into consideration and presented with best output results using tools "nmap scanner" and "shadow security scanner".
www.lifein01.com - for more info
Nmap uses raw IP packets in novel ways to determine what
hosts are available on the network,
services (application name and version) those hosts are offering,
operating systems (and OS versions) they are running,
type of packet filters/firewalls are in use, and dozens of other characteristics.
The Slides deck contains Network penetration testing requirements & Tools used in real world pentesting. For Demo purposes, I had used a vulnhub machine called Metasploitable 2 for testing purposes. Looking into various Ports and Services Vulnerabilities using Kali open source tools.
About Port Scanning
Used Nmap and Shadow Security scanner for the best outputs.
A Detailed description on performing the port scanning mostly for the network administrators.
Why to perform? How to perform? Where to perform? these areas are taken into consideration and presented with best output results using tools "nmap scanner" and "shadow security scanner".
Network scanning with Nmap for Noobs and Ninjas - This slide was presented at Null Delhi monthly security meet by Nikhil and Jayvardhan.
https://www.facebook.com/nullOwaspDelhi/
Network Scanning Phases and Supporting ToolsJoseph Bugeja
This presentation focuses on the network penetration scanning phase. It introduces tools and techniques that professional pen-testers and ethical hackers need to master to find target machines, openings on those targets and vulnerabilities.
Practical White Hat Hacker Training - Active Information GatheringPRISMA CSI
This presentation part of Prisma CSI's Practical White Hat Hacker Training v1
PRISMA CSI • Cyber Security and Intelligence www.prismacsi.com
This document can be shared or used by quoted and used for commercial purposes, but can not be changed. Detailed information is available at https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
2. What’s NMAP ?
-> NMAP is a mapping or a footprinting tool.
-> It is used for network exploration.
-> NMAP collects information about target host.
-> Target can be specified by IP Adress or Domain Name.
-> command : nmap 192.168.10.1 or nmap www.google.com
3. What’s NMAP ?
-> Host / Port / Service Discovery
-> OS Version Detection
-> Service Version Detection
-> Vulnerability and Exploit detection using NSE
-> Firewall and spoofing evasions.
4. Installing NMAP
-> NMAP is available fo all cross platforms.
-> In Linux distros we can install it by using sudo apt-get nmap.
6. Target Specification
-> Target can be a single host or multiple hosts.
nmap 192.168.10.1
nmap 192.168.10.2 192.168.10.3
nmap 192.168.10.1-24
-> any random hosts
nmap -iR 5
9. Default Scan
-> nmap 192.168.10.0/24
->ping phase :
pings all the listed ip address.
-> port scan phase :
If ip address responds to ping i.e host is online then
->nmap scans all the ports of the ip address ( by default it scans 1000
ports ).
12. Host Discovery
-> One of the very first steps in any network expolartion mission is to reduce a
(sometimes huge) set of IP ranges into a list of active hosts.
-> Scanning every port of every single IP address is slow and usually
unnecessary.
-> Nmap offers a wide variety of options for customizing the techniques used.
13. Various Host Discovery Techniques
-> List Scan
->no port scan
-> No ping scan
->TCP SYN Ping
-> TCP ACK Ping
-> UDP Ping
-> Traceroute
14. Varios Host Discovery Techniques
-> ICMP Ping Types
-> no dns resolution
-> DNS Resolution for all targets
15. List Scan
-> List Scan
nmap -sL 192.168.43.0/24
-> simply lists each host of the network specified.
-> it doesnt send any packets to the target hosts.
-> does DNS resolution.
16.
17. No port scan
-> Does’t do port scan after host discovery
->only prints out the available hosts
nmap -sn 192.168.10.0/24
21. TCP SYN Ping
-> This option sends an empty TCP packet with the SYN flag set
nmap -PS 192.168.10.0/24
22.
23. TCP ACK Ping
-> This option sends an empty TCP packet with ACK flag set.
->
nmap -PA 192.168.10.0/24
24.
25. UDP Ping
-> This option sends an empty UDP packets to hosts.
-> Generally ACK and SYN packets are blocked by firewall.
-> This option helps in bypassing firewall.
nmap -PU 192.168.10.0/24
26.
27. ICMP echo ping
-> This options send ICMP echo request to hosts.
nmap -PE 192.168.10.0/24
33. Port Scanning
-> as we have found online hosts .. our next step will be targeting ports of active
hosts.
-> there are 65,535 ports
-> nmap by default scans 1000 ports
-> nmap recognizes ports in 6 states.
34. Port Scanning
Six states rezognized by nmap are :
->open
->closed
-> filtered
->unfiltered
->open | filered
-> close | filtered
49. NMAP Script Engine
->The Nmap Scripting Engine (NSE) is one of Nmap's most powerful and flexible
features.
-> It allows users to write (and share) simple scripts (using the Lua programming
language) to automate a wide variety of networking tasks.
-> NMAP also comes with premade scripts
->NSE can even be used for vulnerability exploitation
50. What’s a script ?
-> a script is basically a predefined code written using Lua Programming
Language
-> this predefined code helps in gathering more information about services running
at the ports.
51. List of Scripts
->nmap comes with premade scripts and are stored in the
/usr/share/nmap/scripts
-> we can list all the premade scripts
ls /usr/share/nmap/scripts
52.
53. List of scripts
-> for different services we have different list of scripts available.
-> we can list scripts available for a particular service using grep command.
ls /usr/share/nmap/scripts | grep “service_name”
-> for example
We can list scripts available for http service
ls /usr/share/nmap/scripts | grep http
54.
55. Script Scanning
-> default script scanning : for different services default scripts are set
-> when default script is run , nmap scan default scripts of services running at
ports.
nmap -sC scanme.nmap.org
69. OUTPUT
-> we can save our scan results in an output file.
-> nmap -oN file_name 192.168.10.1
Outputs to given file name.
-> nmap -oX file_name 192.168.10.1
-> XML Output to given file name.
71. Miscellaneous Options
-> verbose scanning
Print more information about the scan in progress
nmap -v 192.168.10.1
-> aggressive scanning
Enables OS (-O) and service detection(-sV) , traceroute(--
traceroute),
scriptscanning (-sC) .
nmap -A 192.168.10.1