SlideShare a Scribd company logo
1 of 9
NMAP
You’re on the network, now what?
28 Oct 2015, Kevin Alcock
NMAP - What is it?
• free and open source utility for network discovery and
security auditing
• binaries available for Linux, Windows, & Mac OS X
• It was designed to rapidly scan large networks, but
works fine against single hosts.
• uses raw IP packets in novel ways to determine what
hosts are available on the network, what services
(application name and version) those hosts are offering
NMAP
$ nmap 172.16.16.14
$ nmap 172.16.16.10-19
$ nmap 172.16.16.0/24
Default nmap TCP scan uses the 1000 most popular
ports.
see /usr/share/nmap/nmap-services
NMAP - A few options
$ nmap -sT 172.16.16.14
$ nmap -p 80 172.16.16.14
$ nmap -p 1-65535 172.16.16.14
$ nmap -v -sn 172.16.16.10-19
$ nmap -sT -A --top-ports=20 172.16.16.10-19
NMAP - A few options
-O (OS Detection)
-n (No DNS resolution)
-s <ip> (spoof source ip)
-6 (IPv6 scan)
-sV (Grab banners)
Input/Output options
-iL <file> (Input from list of hosts)
--exclude <host1[,host2][,host3],…> (Exclude hosts)
--excludefile <file> (Exclude list from file)
-oG <file> (Grepable output format)
-oX <file> (XML format)
NMAP - NSE scripts
/usr/share/nmap/scripts
--script=
ftp-proftpd-backdoor
smb-os-discovery
vnc-brute
NMAP - More Info
• http://nmap.org
• man nmap
• and google is your friend

More Related Content

What's hot

Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanOWASP Delhi
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)shwetha mk
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniquesamiable_indian
 
Scapy the packet 途中01
Scapy the packet 途中01Scapy the packet 途中01
Scapy the packet 途中01saba syake
 
Brocade - Stingray Application Firewall
Brocade - Stingray Application FirewallBrocade - Stingray Application Firewall
Brocade - Stingray Application FirewallSimon Su
 
BSides London - Scapy Workshop
BSides London - Scapy WorkshopBSides London - Scapy Workshop
BSides London - Scapy WorkshopAdam Maxwell
 
Scanning with nmap
Scanning with nmapScanning with nmap
Scanning with nmapcommiebstrd
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)SSASIT
 
OSMC 2009 | Monitoring and IPv6 by Benedikt Stockebrandt
OSMC 2009 |  Monitoring and IPv6 by Benedikt StockebrandtOSMC 2009 |  Monitoring and IPv6 by Benedikt Stockebrandt
OSMC 2009 | Monitoring and IPv6 by Benedikt StockebrandtNETWAYS
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port ScanningSam Bowne
 
Nebula container orchestrator
Nebula container orchestratorNebula container orchestrator
Nebula container orchestratorNaor Livne
 

What's hot (19)

Nmap and metasploitable
Nmap and metasploitableNmap and metasploitable
Nmap and metasploitable
 
Scapy talk
Scapy talkScapy talk
Scapy talk
 
Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit Ranjan
 
NMAP
NMAPNMAP
NMAP
 
Nmap Basics
Nmap BasicsNmap Basics
Nmap Basics
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniques
 
Scapy the packet 途中01
Scapy the packet 途中01Scapy the packet 途中01
Scapy the packet 途中01
 
CCNP Quizzes
CCNP QuizzesCCNP Quizzes
CCNP Quizzes
 
Brocade - Stingray Application Firewall
Brocade - Stingray Application FirewallBrocade - Stingray Application Firewall
Brocade - Stingray Application Firewall
 
BSides London - Scapy Workshop
BSides London - Scapy WorkshopBSides London - Scapy Workshop
BSides London - Scapy Workshop
 
Scanning with nmap
Scanning with nmapScanning with nmap
Scanning with nmap
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
OSMC 2009 | Monitoring and IPv6 by Benedikt Stockebrandt
OSMC 2009 |  Monitoring and IPv6 by Benedikt StockebrandtOSMC 2009 |  Monitoring and IPv6 by Benedikt Stockebrandt
OSMC 2009 | Monitoring and IPv6 by Benedikt Stockebrandt
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
 
Nmap tutorial
Nmap tutorialNmap tutorial
Nmap tutorial
 
Nebula container orchestrator
Nebula container orchestratorNebula container orchestrator
Nebula container orchestrator
 
Hanz and Franz
Hanz and FranzHanz and Franz
Hanz and Franz
 

Viewers also liked

Ashley O. Senior Project Photoshow
Ashley O. Senior Project PhotoshowAshley O. Senior Project Photoshow
Ashley O. Senior Project Photoshowolson126
 
Gestion del conocimiento
Gestion del conocimiento Gestion del conocimiento
Gestion del conocimiento lulamosa
 
Importancia de los controladores y uso de software de verificacion
Importancia de los controladores y uso de software de verificacionImportancia de los controladores y uso de software de verificacion
Importancia de los controladores y uso de software de verificacionnatalia590
 
Microsoft Small Business Server 2008
Microsoft Small Business Server 2008Microsoft Small Business Server 2008
Microsoft Small Business Server 2008ÇözümPARK
 
11112013 derecho a decidir. desigualdad y fragmentación
11112013 derecho a decidir. desigualdad y fragmentación11112013 derecho a decidir. desigualdad y fragmentación
11112013 derecho a decidir. desigualdad y fragmentaciónupydeuropa
 
Waldain risalat maab maa qabar kay ahkam by kokab noorani
Waldain risalat maab maa qabar kay ahkam by kokab nooraniWaldain risalat maab maa qabar kay ahkam by kokab noorani
Waldain risalat maab maa qabar kay ahkam by kokab nooraniMuhammad Tariq
 
Android mit Google Befreiung, PlayStore Apps im eigenen Repo
Android mit Google Befreiung, PlayStore Apps im eigenen RepoAndroid mit Google Befreiung, PlayStore Apps im eigenen Repo
Android mit Google Befreiung, PlayStore Apps im eigenen RepoB1 Systems GmbH
 
David Špinar: Story Telling & Cross Device
David Špinar: Story Telling & Cross DeviceDavid Špinar: Story Telling & Cross Device
David Špinar: Story Telling & Cross DeviceH1.cz
 
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi tah...
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi  tah...Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi  tah...
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi tah...Muhammad Tariq
 
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitě
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitěCopycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitě
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitěH1.cz
 
250 Fractionated radiation therapy for malignant brain tumors
250 Fractionated radiation therapy for malignant brain tumors250 Fractionated radiation therapy for malignant brain tumors
250 Fractionated radiation therapy for malignant brain tumorsNeurosurgery Vajira
 
Finding material properties
Finding material propertiesFinding material properties
Finding material propertiesalwerhane
 
Risala hurmat mazameer
Risala hurmat mazameerRisala hurmat mazameer
Risala hurmat mazameerMuhammad Tariq
 
Poslední středa: Analytika Čaje týdne (Marek Prokop)
Poslední středa: Analytika Čaje týdne (Marek Prokop) Poslední středa: Analytika Čaje týdne (Marek Prokop)
Poslední středa: Analytika Čaje týdne (Marek Prokop) H1.cz
 

Viewers also liked (15)

Ashley O. Senior Project Photoshow
Ashley O. Senior Project PhotoshowAshley O. Senior Project Photoshow
Ashley O. Senior Project Photoshow
 
Gestion del conocimiento
Gestion del conocimiento Gestion del conocimiento
Gestion del conocimiento
 
Importancia de los controladores y uso de software de verificacion
Importancia de los controladores y uso de software de verificacionImportancia de los controladores y uso de software de verificacion
Importancia de los controladores y uso de software de verificacion
 
Microsoft Small Business Server 2008
Microsoft Small Business Server 2008Microsoft Small Business Server 2008
Microsoft Small Business Server 2008
 
11112013 derecho a decidir. desigualdad y fragmentación
11112013 derecho a decidir. desigualdad y fragmentación11112013 derecho a decidir. desigualdad y fragmentación
11112013 derecho a decidir. desigualdad y fragmentación
 
Waldain risalat maab maa qabar kay ahkam by kokab noorani
Waldain risalat maab maa qabar kay ahkam by kokab nooraniWaldain risalat maab maa qabar kay ahkam by kokab noorani
Waldain risalat maab maa qabar kay ahkam by kokab noorani
 
Android mit Google Befreiung, PlayStore Apps im eigenen Repo
Android mit Google Befreiung, PlayStore Apps im eigenen RepoAndroid mit Google Befreiung, PlayStore Apps im eigenen Repo
Android mit Google Befreiung, PlayStore Apps im eigenen Repo
 
Gestão de Tempo
Gestão de TempoGestão de Tempo
Gestão de Tempo
 
David Špinar: Story Telling & Cross Device
David Špinar: Story Telling & Cross DeviceDavid Špinar: Story Telling & Cross Device
David Špinar: Story Telling & Cross Device
 
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi tah...
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi  tah...Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi  tah...
Sharha qaseeda al burda lil bosairi by shaikh jamal bin naseer al jinabi tah...
 
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitě
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitěCopycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitě
Copycamp 2016 - Daniel Gamrot - 10 kroku k vyšší produktivitě
 
250 Fractionated radiation therapy for malignant brain tumors
250 Fractionated radiation therapy for malignant brain tumors250 Fractionated radiation therapy for malignant brain tumors
250 Fractionated radiation therapy for malignant brain tumors
 
Finding material properties
Finding material propertiesFinding material properties
Finding material properties
 
Risala hurmat mazameer
Risala hurmat mazameerRisala hurmat mazameer
Risala hurmat mazameer
 
Poslední středa: Analytika Čaje týdne (Marek Prokop)
Poslední středa: Analytika Čaje týdne (Marek Prokop) Poslední středa: Analytika Čaje týdne (Marek Prokop)
Poslední středa: Analytika Čaje týdne (Marek Prokop)
 

Similar to Discover Network Services and Hosts with NMAP

Nmap basics-1198948509608024-3
Nmap basics-1198948509608024-3Nmap basics-1198948509608024-3
Nmap basics-1198948509608024-3Harsh Desai
 
This Assignment consists of Amazon Web services
This Assignment consists of Amazon Web servicesThis Assignment consists of Amazon Web services
This Assignment consists of Amazon Web servicesMahesh688216
 
Nmap basics
Nmap basicsNmap basics
Nmap basicsitmind4u
 
Practical White Hat Hacker Training - Active Information Gathering
Practical White Hat Hacker Training - Active Information GatheringPractical White Hat Hacker Training - Active Information Gathering
Practical White Hat Hacker Training - Active Information GatheringPRISMA CSI
 
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019Nikhil Raj
 
Lab-5 Scanning and Enumeration Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration        Reconnaissance and inform.docxLab-5 Scanning and Enumeration        Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration Reconnaissance and inform.docxLaticiaGrissomzz
 
Network Mapper (NMAP)
Network Mapper (NMAP)Network Mapper (NMAP)
Network Mapper (NMAP)KHNOG
 
NMap 101 offline meetup by CyberForge Academy
NMap 101 offline meetup by CyberForge AcademyNMap 101 offline meetup by CyberForge Academy
NMap 101 offline meetup by CyberForge Academycyberforgeacademy
 
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit BasicsNetwork Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit BasicsBishop Fox
 
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...idsecconf
 
Nmap Discovery
Nmap DiscoveryNmap Discovery
Nmap DiscoveryTai Pan
 

Similar to Discover Network Services and Hosts with NMAP (20)

Zen map
Zen mapZen map
Zen map
 
Nmap basics-1198948509608024-3
Nmap basics-1198948509608024-3Nmap basics-1198948509608024-3
Nmap basics-1198948509608024-3
 
Nmap
NmapNmap
Nmap
 
This Assignment consists of Amazon Web services
This Assignment consists of Amazon Web servicesThis Assignment consists of Amazon Web services
This Assignment consists of Amazon Web services
 
Nmap
NmapNmap
Nmap
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Practical White Hat Hacker Training - Active Information Gathering
Practical White Hat Hacker Training - Active Information GatheringPractical White Hat Hacker Training - Active Information Gathering
Practical White Hat Hacker Training - Active Information Gathering
 
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
 
Lab-5 Scanning and Enumeration Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration        Reconnaissance and inform.docxLab-5 Scanning and Enumeration        Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration Reconnaissance and inform.docx
 
Network Mapper (NMAP)
Network Mapper (NMAP)Network Mapper (NMAP)
Network Mapper (NMAP)
 
NMap 101 offline meetup by CyberForge Academy
NMap 101 offline meetup by CyberForge AcademyNMap 101 offline meetup by CyberForge Academy
NMap 101 offline meetup by CyberForge Academy
 
Namp
Namp Namp
Namp
 
wireshark.pdf
wireshark.pdfwireshark.pdf
wireshark.pdf
 
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit BasicsNetwork Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
 
Network for amin
Network for aminNetwork for amin
Network for amin
 
Contents namp
Contents nampContents namp
Contents namp
 
Contents namp
Contents nampContents namp
Contents namp
 
NMAP1.ppt
NMAP1.pptNMAP1.ppt
NMAP1.ppt
 
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
 
Nmap Discovery
Nmap DiscoveryNmap Discovery
Nmap Discovery
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

Discover Network Services and Hosts with NMAP

  • 1. NMAP You’re on the network, now what? 28 Oct 2015, Kevin Alcock
  • 2.
  • 3. NMAP - What is it? • free and open source utility for network discovery and security auditing • binaries available for Linux, Windows, & Mac OS X • It was designed to rapidly scan large networks, but works fine against single hosts. • uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering
  • 4. NMAP $ nmap 172.16.16.14 $ nmap 172.16.16.10-19 $ nmap 172.16.16.0/24 Default nmap TCP scan uses the 1000 most popular ports. see /usr/share/nmap/nmap-services
  • 5. NMAP - A few options $ nmap -sT 172.16.16.14 $ nmap -p 80 172.16.16.14 $ nmap -p 1-65535 172.16.16.14 $ nmap -v -sn 172.16.16.10-19 $ nmap -sT -A --top-ports=20 172.16.16.10-19
  • 6. NMAP - A few options -O (OS Detection) -n (No DNS resolution) -s <ip> (spoof source ip) -6 (IPv6 scan) -sV (Grab banners)
  • 7. Input/Output options -iL <file> (Input from list of hosts) --exclude <host1[,host2][,host3],…> (Exclude hosts) --excludefile <file> (Exclude list from file) -oG <file> (Grepable output format) -oX <file> (XML format)
  • 8. NMAP - NSE scripts /usr/share/nmap/scripts --script= ftp-proftpd-backdoor smb-os-discovery vnc-brute
  • 9. NMAP - More Info • http://nmap.org • man nmap • and google is your friend