This is the second episode of a series article about second step of ethical hacking/penetration testing, as we have deeply talked about the importance of port scanning and on the previous article we have discussed some about Nmap.
This article will talk about the practical aspect of Nmap, how to perform a quick scan to know about the open ports and services?
Nmap was originally command line tool that has been developed for only Unix/Linux based operating system but now its windows version is also available and ease to use.You can download the Nmap installer for windows and for Linux open terminal and type
sudo apt-get install nmap
Ok now we are going to start with simple scan, for nmap help
$ nmap --help
For a quick and simple scan use.
$ nmap 192.168.1.1
Starting Nmap 5.21 ( http://nmap.org ) at 2011-04-08 23:06 PKT
Nmap scan report for 192.168.1.1
Host is up (0.0012s latency).
Not shown: 997 filtered ports
PORT STATE SERVICE
21/tcp open ftp
23/tcp open telnet
80/tcp open http
Nmap done: 1 IP address (1 host up) scanned in 6.22 seconds
Starting Nmap 5.21 ( http://nmap.org ) at 2011-04-08 23:06 PKT
Nmap scan report for 192.168.1.1
Host is up (0.0012s latency).
Not shown: 997 filtered ports
PORT STATE SERVICE
21/tcp open ftp
23/tcp open telnet
80/tcp open http
Nmap done: 1 IP address (1 host up) scanned in 6.22 seconds
Is it simple scan? Yes it is a simple scan that let you know about the open ports in any machine, now if want to scan a whole network than you have to type this with subnet.
$ nmap 192.168.1.1/24 or $ nmap 192.168.1.*
$ nmap 192.168.1.1/24 or $ nmap 192.168.1.*
- Nmap - Interesting options
- -f fragments packets
- -D Launches decoy scans for concealment
- -I IDENT Scan – finds owners of processes (on Unix systems)
- -b FTP Bounce
- Port Scan Types
- TCP Connect scan
- TCP SYN scan
- TCP FIN scan
- TCP Xmas Tree scan (FIN, URG, and PUSH)
- TCP Null scan
- TCP ACK scan
- UDP scan
Nmap works on the basic scanning types like:
- TCP connect() scanning
- TCP SYN scanning
- TCP FIN scanning
- Fragmentation scanning
- TCP reverse ident scanning
- FTP bounce attack
- UDP ICMP port unreachable scanning
- UDP recvfrom() and write() scanning
- ICMP echo scanning
Operating system detection or OS fingerprnting is the important part of scanning you should know about the operating system of target machine to launch an available exploit on it. Nmap provides you know about running operating system although you can find it by using banner grabbing but why doing to much job. Use -O for operating system.
$ nmap -O 192.168.1.1
No comments:
Post a Comment