Tuesday 13 December 2011

### NMap ###



 1. Port/Reconnaissance Scanner
 2. Hosts & device detection
 3. Service detection
 4. OS Fingerprinting
 5. Multi-target scanning
 6. Produces various reports

Tasks:
 1. Download and install the latest version of NMap - nmap.org
  a. wget http://download.insecure.org/nmap/dist/nmap-4.53-1.i386.rpm
  b. rpm -Uvh nmap-4.53-1.i386.rpm

/usr/bin/nmap - primary binary
Note: Executing 'nmap' as non-privileged user, causes it to operate in TCP-Connect mode, instead of the stealthy TCP-SYN mode

/usr/share/nmap - top-level container for key NMap files
/usr/share/nmap/nmap-os-db - OS Fingerprinting DB
/usr/share/nmap/nmap-mac-prefixes - Maps MAC prefixes to companies
/usr/share/nmap/nmap-services - resolves service names to port numbers


Usage:
 1. Scan the localhost for open ports
  a. nmap -v localhost

 2. Service detection scan - attempts to resolve services to names & versions
  a. nmap -v -sV 192.168.75.199

 3. OS Fingerprinting scan
  a. nmap -v -O 192.168.75.199

 4. Reporting
  a. nmap -v -oN filename.txt 192.168.75.1 - normal output
  b. nmap -v -oX filename.xml 192.168.75.1 - XML output

 5. OS Fingerprinting & Service detection
  a. nmap -v -A 192.168.75.1

 6. Scan the entire network using '-A' and XML output
  a. nmap -v -A -oX 192.168.75.0.scan.xml 192.168.75.0/24

No comments:

Post a Comment