1. Nmap

Description:

  • Nmap (Network Mapper) is an open-source tool used for network discovery and security auditing. It can be used to discover hosts, services, operating systems, and vulnerabilities on a network. It is one of the most popular tools for penetration testers and network administrators.

Examples:

    1. Basic Host Discovery:
      • nmap -sn 192.168.1.0/24

Explanation: Performs a ping scan on the entire network to discover all active hosts without scanning individual ports (-sn stands for “ping scan”).

    1. Port Scanning:
      • nmap -p 1-65535 192.168.1.10

Explanation: Scans all TCP ports (1-65535) on the target machine with IP 192.168.1.10.

    1. Service Version Detection:
      • nmap -sV 192.168.1.10

Explanation: Attempts to detect the version of services running on the target’s open ports (-sV is used for version detection).

    1. Operating System Detection:
      • nmap -O 192.168.1.10

Explanation: Attempts to detect the operating system of the target using TCP/IP stack fingerprinting.

    1. Aggressive Scan:
      • nmap -A 192.168.1.10

Explanation: Performs OS detection, version detection, script scanning, and traceroute in a single command (-A stands for aggressive).

    1. Disable Ping:
      • nmap -Pn 192.168.1.10

Explanation: Scans the target without pinging it first (-Pn disables host discovery). This is useful when ICMP requests are blocked by the target.

Scroll to Top