https://script.spoken-tutorial.org/index.php?title=Nmap&feed=atom&action=historyNmap - Revision history2024-03-29T01:07:55ZRevision history for this page on the wikiMediaWiki 1.23.17https://script.spoken-tutorial.org/index.php?title=Nmap&diff=1529&oldid=prevMinal: Created page with '[http://www.nmap.org Nmap] is a security port scanner originally written by Gordon Lyon. As a "Network Mapper" we can discover computers and services on a computer network. Nmap…'2012-12-11T12:37:47Z<p>Created page with '[http://www.nmap.org Nmap] is a security port scanner originally written by Gordon Lyon. As a "Network Mapper" we can discover computers and services on a computer network. Nmap…'</p>
<p><b>New page</b></p><div>[http://www.nmap.org Nmap] is a security port scanner originally written by Gordon Lyon. As a "Network Mapper" we can discover computers and services on a computer network. Nmap is capable of discovering passive services on a network despite the fact that such services aren't advertising themselves with a service discovery protocol. Nmap can also determine various details about the remote computers like operating system, device type, uptime, exact version number of that product and even vendor of the remote network card. Nmap runs on wide varity of platform like Linux kernal based OS, Microsoft Windows, Solaris, and BSD (including Mac OS X). In this tutorial we are going to use '''Nmap version 5.00 ( http://nmap.org )''' and '''Ubuntu''' as the operating system. <br />
<br />
Please see the associated text box of individual spoken tutorials on the website to decide the versions of software and OS to which it is applicable. <br />
<br />
Let us try to find out the Operating System Version by including '''-O''' switch. Since we need to craft special TCP & UDP packets we need to become root to execute this command as shown.<br />
'''Usage''' <br /><br />
bala@bala-laptop:~$ sudo nmap -O 192.168.56.101<br />
[sudo] password for bala: <br />
Starting Nmap 5.00 ( http://nmap.org ) at 2011-10-18 14:14 IST<br />
Interesting ports on 192.168.56.101:<br />
Not shown: 998 closed ports<br />
PORT STATE SERVICE<br />
80/tcp open http<br />
8080/tcp open http-proxy<br />
MAC Address: 08:00:27:9A:A5:DF (Cadmus Computer Systems)<br />
'''Running:''' Linux 2.6.X<br />
'''OS details:''' Linux 2.6.19 - 2.6.24<br />
OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .<br />
Nmap done: 1 IP address (1 host up) scanned in 15.02 seconds<br />
bala@bala-laptop:~$<br />
<br />
'''Applications''' <br /><br />
1. Used to reveal the services running on a network.<br />
2. Used to reveal the version of services running on a network.<br />
3. Used to reveal the name of Operating system running on a network.<br />
4. Used to reveal any unauthorized services running on a network.<br />
5. Used extensively by network Penetration Testers, Computer Security Professionals, Auditors etc....<br />
<br />
'''Prerequisites''' <br /><br />
* Hardware requirements 1GB+ of RAM would surely help, I am using 4GB RAM as I have to record things along.<br />
* Pentium 4 should be more than enough, though I am running mine on Intel Pentium Core2Duo<br />
* Good understanding of TCP/UDP packets.<br />
* Little understanding about Packet Capture tools like Wireshark or tshark, to visually see the TCP/UDP packets and understand <br />
TCP 3 way hand shake to form a connection.<br />
* Little understanding about Virtual Machines as we cannot attack any other machines to pull out the results, we will create a <br />
small network in our own computer to work things out.<br />
<br />
__TOC__<br />
<br />
== BASIC - Level Zero Tutorials ==<br />
<br />
# Introduction to nmap? &nbsp; &nbsp; <br />
#* Network Inventory<br />
#* Policy Compliance<br />
#* Security Auditing<br />
# Downloading and Installing NMAP :-D &nbsp; &nbsp; <br />
#* Sudo apt-get - for Debian based machines<br />
#* yum install - for RPM based machines<br />
#* self-installer executable - for Windows machines<br />
# Using NMAP &nbsp; &nbsp;<br />
#* Port Scanning<br />
#* Discovering Hosts <br />
#* Detecting Operating System<br />
#* Detecting Service and Application Versions<br />
#* Options in NMAP scanning<br />
# Intro & Working with Zenmap &nbsp; &nbsp; <br />
#* Installing Zenmap<br />
#* Running Zenmap<br />
#* Carryout Zenmap scans<br />
#* Manipulate Zenmap profiles<br />
#* Administer Zenmap Results<br />
<br />
<!-- == ADVANCE - Level One Tutorials ==<br />
# OS Fingerprinting Using Nmap :-) &nbsp; &nbsp; <br />
#* About OS Fingerprinting<br />
#* OS Fingerprinting Mechanics of NMAP<br />
#* Administrative Tool Function of NMAP<br />
#* Evading OS Fingerprinting scan<br />
# In's and Out's of NMAP &nbsp; &nbsp; <br />
#* Diff NMAP<br />
#* Remote NMAP<br />
#* NMAP-Parser<br />
#* Bilbo<br />
# More will get added as needed :-) &nbsp; &nbsp; <br />
#* <br />
#*<br />
#* --><br />
<br />
== LOG ==<br />
[[Log]]<br /><br />
Stages in the life-cycle of Spoken Tutorials, the Stage0 and Stage1 gives the template which needs to be followed.<br /><br />
[[Stage 0]]<br /><br />
[[Stage1]]<br /></div>Minal