![]() Nmap done: 1 IP address (1 host up) scanned in 3.40 seconds Here’s the result of another scan, against a desktop machine running Ubuntu 9.10: Starting Nmap 5.21 ( ) at 00:00 EST As an added bonus, Nmap tells me that the device is one hop away, the MAC address of the device and manufacturer of the NIC, the open ports, and how long the scan took. I ran this particular scan against an Apple Airport Extreme router. ![]() Here it takes a guess at the operating system that might be running on the system. Nmap done: 1 IP address (1 host up) scanned in 10.21 secondsĪs you can see, Nmap provides a lot of data. OS details: VxWorks: Apple AirPort Extreme v5.7 or AirPort Express v6.3 Canon imageRUNNER printer (5055, C3045, C3380, or C5185) Kyocera FS-4020DN printer or Xerox Phaser 8860MFP printer Running: Apple embedded, Canon embedded, Kyocera embedded, Xerox embedded When it finishes, you’ll see something like this: Starting Nmap 5.21 ( ) at 23:52 EST The scan might take a minute or so to run, so be patient. Note that Nmap requires root privileges to run this type of scan. Let’s say you want to scan a host to see what operating system it is running. The basic syntax for Nmap is Nmap Scan Type Options target. You can find the sources and some binaries on the download page. The most recent release of Nmap came out in early 2010, so the most recent version (5.21) might not be in the current stable releases. You’ll find Nmap packaged for most major Linux distros. In this tutorial, I’ll cover some of the basics of using Nmap and provide some examples you can use quickly. Once you get to know Nmap a bit, you’ll notice that it makes all types of cameo appearances in movies. It is, in short, a very good tool to know. It can be used for security scans, simply to identify what services a host is running, to “fingerprint” the operating system and applications on a host, the type of firewall a host is using, or to do a quick inventory of a local network. ![]() What is Nmap? Short for “network mapper,” nmap is a veritable toolshed of functionality to perform network scans. Ever wondered how attackers know what ports are open on a system? Or how to find out what services a computer is running without just asking the site admin? You can do all this and more with a handy little tool called Nmap. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |