Search the Community
Showing results for tags 'NMAP'.
Found 3 results
-
Check this out: [Hidden Content] Get it here: [Hidden Content]
-
Nmap *Nmap is the predominate port scanner for network security professionals.... NMAP Overview Port States NMAP will categorize ports as being in one of the following states: Open – The port is accepting TCP connections and UDP packets. This means that an application is running that is using this port. Closed – The port responds to NMAP probe requests but no application is using this port Filtered – The port state cannot be determined because packet filters prevent NMAP probes from reaching the port Unfiltered – The port is accessible but NMAP cannot determine if it is open or closed Open | Filtered – NMAP cannot determine if the port is open or filtered Closed | Filtered – NMAP cannot determine if the port is closed or filtered nmap scan option Nmap has lots of options, so we are going to focus on only some of them. common options: -h Nmap help -sS TCP SYS scan -sT TCP connet() scan -sU UDP port scans -v verbose output -vv very verbose output -O detect operating system -sV serivce version detect -P0 dont ping , just scan -A aggressive as of right not this does the same thing as -O -sV -T paranoid|Sneaky|Polite|Normal|aggressive|Lnsane -P chosse your ports ( scan all port with 0 -65535) -F Fast Scan: Scan only ports in the nmap-service file -n Don't do revese Dns lookup EXAMPLE: # nmap -T Insane -F -O -n 192.168.16.11-15 ---------------number of host scan #nmap -T Insane -n -O -sS 192.168.1.* ---------------complete scan the class c