Difference between revisions of "Nmap"

From Gangplank
Jump to navigation Jump to search
(Created page with "'''Nmap''' (Network Mapper) <ref>wikipedia:Nmap</ref> is a cross-platform (BSD, Linux, Mac, Windows) utility for network discovery and security auditing. == Network disco...")
 
m
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
'''Nmap''' (Network Mapper) <ref>[[wikipedia:Nmap]]</ref> is a cross-platform (BSD, Linux, Mac, Windows) utility for network discovery and security auditing.
'''Nmap''' (Network Mapper) <ref>[[wikipedia:Nmap]]</ref> is a cross-platform (BSD, Linux, Mac, Windows) utility for network discovery and security auditing.

== Backgroud ==
Nmap is a useful tool to find the IP address of a device (e.g. if the device acquired the IP address via DHCP) or to debug connectivity problems (e.g. to check if a firewall blocks ports).


== Network discovery example ==
== Network discovery example ==
In a terminal window you type:
In a terminal window type:

nmap -v 192.168.1.*

You can specify a specific IP address to scan a single host or use an asterisk (wildcard character) to scan an entire subnet. The resulting output contains a list of discoverd devices with their hostname, IP address and active network ports.

== UDP scan example ==


nmap 192.168.1.*
sudo nmap -v -sU 192.168.0.1


This command scans the UDP ports of a specific device.
The resulting output shows you a list of the discoverd devices with their accessible network ports.


== References ==
== References ==

Latest revision as of 12:48, 16 April 2021

Nmap (Network Mapper) [1] is a cross-platform (BSD, Linux, Mac, Windows) utility for network discovery and security auditing.

Backgroud

Nmap is a useful tool to find the IP address of a device (e.g. if the device acquired the IP address via DHCP) or to debug connectivity problems (e.g. to check if a firewall blocks ports).

Network discovery example

In a terminal window type:

nmap -v 192.168.1.*

You can specify a specific IP address to scan a single host or use an asterisk (wildcard character) to scan an entire subnet. The resulting output contains a list of discoverd devices with their hostname, IP address and active network ports.

UDP scan example

sudo nmap -v -sU 192.168.0.1

This command scans the UDP ports of a specific device.

References

External links

https://nmap.org