What Is Nmap? A Comprehensive Guide For Network Mapping
Last Updated :
28 Aug, 2025
Nmap (Network Mapper) is an open-source network scanning tool used to discover devices, identify open ports, detect services and their versions, and gather information about operating systems on a network. It is widely used for network auditing, security assessments, and troubleshooting. Nmap allows users to do a bunch of things that are related to a wide range of network-related tasks.
- Network Discovery: With Nmap, users can scan networks and discover devices and hosts on a network, allowing network admins to understand the network more efficiently.
- Port Scanning: It can determine which ports are open and which services are running on those ports, which is critical for security assessments and vulnerability scanning.
- OS Fingerprinting: Nmap can attempt to identify the operating system running on a target host by analyzing various characteristics of network packets.
- Vulnerability Assessment: It's a valuable tool for identifying potential vulnerabilities in systems and services, aiding in proactive security measures.
- Network Monitoring: Nmap can be used for continuous monitoring to detect changes in the network environment.
Features of Nmap
Nmap offers a wide range of features to its users, including:
Features Of Nmap- Comprehensive Scanning: Nmap can scan a variety of protocols and perform different types of scans.
- Scripting Engine: Nmap Scripting Engine(NSE) allows users to write and run their custom scripts to automate various tasks of Nmap such as Network auditing and vulnerability scanning.
- OS Detection: Nmap can used to identify the operating system of the target hosts based on their responses to the network probes.
- Service and Version Detection: Nmap can accurately identify the services and versions that are running on the open ports of the target hosts.
- Output Formats: Nmap supports multiple output formats for the scan results like plain text, XML, and greppable output.
Importance of Nmap
There are a few points that reflect the work of Nmap and provide many reasons to have Nmap on your network.
Importance of Nmap- Security Assessment: One of the main reasons to have Nmap is to assess the security of your network. you can do this by scanning open ports and services, and can further identify potential entry points for attackers.
- Intrusion Detection: Nmap can be used to detect unauthorized or unexpected changes in your network environment. Regular scans can help you identify new or rogue devices that shouldn't be on your network.
- Inventory Management: Nmap provides an efficient way to create an inventory of all devices on your network. This is crucial for keeping track of your network's assets and ensuring you have control over what's connected.
- Network Troubleshooting: Whenever there is a network issue, Nmap can help you identify the root cause of the issue by pinpointing the status of the network services and devices. which can further help you resolve the issue in a better manner.
- Vulnerability Scanning: Nmap can be used in conjunction with vulnerability databases and scripts (such as NSE scripts) to scan for known vulnerabilities on devices. This aids in proactive security measures to patch or mitigate vulnerabilities before they are exploited.Update the package list
Installing Nmap on Kali Linux
Kali Linux usually comes with Nmap pre-installed, since it is one of the most commonly used penetration testing tools. However, if it is not installed or you want to update it to the latest version, you can do so with the following commands:
1. Refresh the package index
sudo apt update
2. Install Nmap
sudo apt install nmap -y
3. Confirm the Installation
nmap --version
If installed successfully, you’ll see output similar to:
Nmap VersionLet's See Nmap in Action With Some Simple Examples:
Here's a simple example of how to use Nmap for basic network scanning. We'll perform a basic host discovery and a port scan.
1. Scan a Single IP
Command:
nmap 45.81.17.27
This scans one specific host (IP address) to find open ports and services. It’s the simplest and most common Nmap usage.
2. Scan a Subnet (CIDR Notation)
Command:
<TARGET IP>/24
This scans all hosts in the subnet 192.168.1.0–192.168.1.255
. Useful for discovering all active devices in a local network.
3. Scan Targets from a File
Command:
nmap -iL targets.txt
Instead of typing multiple IPs, you can put them in a text file (targets.txt
) and Nmap will scan them all automatically.
4. Exclude Specific Hosts
Command:
nmap 192.168.1.0/24 --exclude 192.168.1.1
When scanning a large subnet, you can skip specific hosts using --exclude
. For example, here the .1
address won’t be scanned.
5. TCP SYN Scan (Stealth Scan)
Command:
sudo nmap <TARGET IP> -sS
This is the most popular scan type (and default for root). It’s fast and stealthy, as it doesn’t complete the full TCP handshake.
6. TCP Connect Scan
Command:
nmap <TARGET IP> -sT
Explanation:
If you don’t have root privileges, Nmap falls back to this scan. It performs a full TCP connection on each port.
7. UDP Port Scan
Command:
sudo nmap <TARGET IP> -sU
Scans for services running on UDP ports (e.g., DNS, SNMP). Slower than TCP scans but important for full coverage.
8. Host Discovery Only (Ping Scan)
Command:
nmap <TARGET IP>/24 -sn
Checks which hosts are alive in a network without scanning their ports. Great for quick network mapping.
9. Skip Host Discovery (Force Port Scan)
Command:
nmap <TARGET IP> -Pn
If ping is blocked (firewall), Nmap may think the host is down. -Pn
forces a port scan without host discovery.
10. Disable DNS Resolution
Command:
nmap 192.168.1.1 -n
By default, Nmap tries to resolve IPs into hostnames, which slows scans. -n
skips DNS lookups for faster results.
Explore
Linux/Unix Tutorial
10 min read
Getting Started with Linux
Installation with Linux
Linux Commands
Linux File System
Linux Kernel
Linux Networking Tools
Linux Process
Linux Firewall
Shell Scripting & Bash Scripting