Nmap command
Introduction
• NMAP abbreviation is network mapper
• NMAP is used to scan ports on a machine, either local or
remote machine (just you require IP/hostname to scan).
• NMAP is can be installed on windows, Sun Solaris
machines too.
• NMAP can be used to scan large networks, remember I
am saying large networks.
• NMAP can be used to get operating system details such
as open ports,
• software used for a service and it’s version no,
• vendor of network card and up time of that system too
• Please do not try to use NMAP on machines which
you don’t have permission.
• Can be used by hackers to scan for systems for
vulnerability.
• 192.168.0.100 – server1.tecmint.com
• 192.168.0.101 – server2.tecmint.com
Scan a System with Hostname and IP Address
• The Nmap tool offers various methods to scan a system.
• Perform a scan using hostname as server2.tecmint.com to find
out all open ports, services and MAC address on the system.
Scan using “-v” option
• we can see that the below command with “-v”
option is giving more detailed information about
the remote machine.
Scan Multiple Hosts
• We can scan multiple hosts by simply writing their
IP addresses or hostnames with Nmap.
Scan a whole Subnet
• we can scan a whole subnet or IP range with Nmap
by providing * wildcard with it.
Scan Multiple Servers using last octet of IP address
• You can perform scans on multiple IP address by
simple specifying last octet of IP address.
Scan list of Hosts from a File
• If we have more hosts to scan and all host details
are written in a file , we can directly ask nmap to
read that file and perform scans. Let’s see how to
do that.
• Create a text file called “nmaptest.txt” and define
all the IP addresses or hostname of the server that
you want to do a scan.
• Next, run the following command with “iL” option
with nmap command to scan all listed IP address in
the file.
• # nmap –iL filename
Scan an IP Address Range
• We can specify an IP range while performing scan
with Nmap.
Perform a Fast Scan
• We can perform a fast scan with “-F” option to
scans for the ports listed in the nmap-services files
and leaves all other ports.
• # nmap hostname