Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
1K views10 pages

NMAP: A Guide for Network Admins

NMAP is a free and open-source tool used for network discovery and security auditing. It was developed by Gordon Lyon and allows users to discover open ports, map networks, and detect operating systems. NMAP works by sending packets to ports on a remote target and analyzing the responses to determine which ports are open, filtered, or closed.

Uploaded by

mano2116
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views10 pages

NMAP: A Guide for Network Admins

NMAP is a free and open-source tool used for network discovery and security auditing. It was developed by Gordon Lyon and allows users to discover open ports, map networks, and detect operating systems. NMAP works by sending packets to ports on a remote target and analyzing the responses to determine which ports are open, filtered, or closed.

Uploaded by

mano2116
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

NMAP

Jen Beveridge and Joe Kolenda


secret.pathetic.net

History of NMAP
• Developed by Gordon Lyon
• Features
– Host discovery
– Port scanning
– Version detecting
– OS detection
– Scriptable interaction with the target
Uses of NMAP
• Identifying open ports
• Network Mapping
• Auditing security
Tool Environment
• Runs on Linux, Windows, Mac OS X and other
smaller operating systems
• GUI options:
– Zenmap
– XNMap
– NmapFE
How It Works
• DNS lookup- matches name with IP
• NMap pings the remote target with 0 byte
packets to each port
– If packets are not received back, port is open
– If packets are received, port is closed
• Sends different packets with different timing
to determine filtered/unfiltered, version, etc.
• Firewalls can interfere with this process
Output from NMAP
• Displays open ports
• Different output based upon constraints on
run, but can show
– Version type
– Filtered/unfiltered
Basic NMAP scans
• When run through command prompt or terminal,
entry fields are:
– Program
– Constraints on run
– Target

• Ex. > nmap –sS scanme.nmap.org


• Ex. > nmap -Db ftp.pathetic.net
secret.pathetic.net
User Experience
• Easy to install
• Fairly easy to use, firewall problems and
network setting issues
• User guide available, many tutorials
• Scan time- can range from a few seconds to
several hours
• Can scan over a range of IP addresses and
utilize stealthy scanning
Ethical Issues
• Can be used for hacking- to discover
vulnerable ports
• System admins can use it to check that
systems meet security standards
• Unauthorized use of Nmap on a system could
be illegal. Make sure you have permission
before using this tool

You might also like