Nmap Basic’s part one Simple scan
Read Time2 Minutes, 30 Seconds

Welcome back to hacking arise lads Laughing Man here with a very basic understanding of some the commands in Nmap Free Security Scanner

What is Nmap network scanner

Nmap is a free and open-source network scanner created by Gordon Lyon. Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection Find out more

How To use Nmap

First let me start by saying i have Nmap install on my system but for people using termux type pkg install nmap this will install it on your termux as many os systems have it installed like Kali,parrot,cyborg hawk,black arch arch strike etc …

So see nmap full commands type Nmap in terminal or man nmap this gave you the manual for nmap in the terminal
Hacking A Rise nmap-208x300 Nmap Basic's part one Simple scan FEATURED Information Gathering Linux Pentesting Reconnaissance Reporting Tools sniffing and spoofing

note

some times when scanning you will be blocked this dont mean it dont work means the target not responding to the pings so if this happens use -Pn (eg nmap -Pn google.com and for IP’s nmap -Pn 127.0.0.1 )

simple scan

so this a simple command for a simple scan for ips or a website its easy just type nmap 127.0.0.1
well you wont be using the local host so if its a website put the url or if its a ip type it.
Hacking A Rise nmap127-300x104 Nmap Basic's part one Simple scan FEATURED Information Gathering Linux Pentesting Reconnaissance Reporting Tools sniffing and spoofing

Post scanning

Right now lets move on to ways to find the ports we need so lets start by looking for a specific port this be port 80 so in terminal type nmap -p 80 127.0.0.1
Hacking A Rise nmap-p80-300x77 Nmap Basic's part one Simple scan FEATURED Information Gathering Linux Pentesting Reconnaissance Reporting Tools sniffing and spoofing

so scanning one port is easy so lets scan two ports at one time so type nmap -p 80,433 127.0.0.1
Hacking A Rise nmap80443-300x72 Nmap Basic's part one Simple scan FEATURED Information Gathering Linux Pentesting Reconnaissance Reporting Tools sniffing and spoofing
now what we want to get all the ports on a ip or server we use this command nmap -p 1-9999 127.0.0.1
Hacking A Rise fullports-300x97 Nmap Basic's part one Simple scan FEATURED Information Gathering Linux Pentesting Reconnaissance Reporting Tools sniffing and spoofing

Ip Range

Now we move on two ip range scanning this help you nmap a network and see what devices are on it the two main commands for that are
nmap 127.0.0.1/28
Hacking A Rise nmapover29-219x300 Nmap Basic's part one Simple scan FEATURED Information Gathering Linux Pentesting Reconnaissance Reporting Tools sniffing and spoofing

or we can use this one nmap 127.0.0.1/14
Hacking A Rise nmap14-300x80 Nmap Basic's part one Simple scan FEATURED Information Gathering Linux Pentesting Reconnaissance Reporting Tools sniffing and spoofing

what id we want to see everyone on the network we use the nmap 127.0.0.* this gave you everyone on the network 1 to 256
Hacking A Rise nmap-1-300x179 Nmap Basic's part one Simple scan FEATURED Information Gathering Linux Pentesting Reconnaissance Reporting Tools sniffing and spoofing

now lets take out a few ips to be excluded from the scan type nmap 127.0.0.* --exclude 127.0.0.1,127.0.0.2
Hacking A Rise nmap-xclude-262x300 Nmap Basic's part one Simple scan FEATURED Information Gathering Linux Pentesting Reconnaissance Reporting Tools sniffing and spoofing

top 20 ports

you way ask your self whats the top 20 ports well there

  • 21/tcp closed ftp
    22/tcp closed ssh
    23/tcp closed telnet
    25/tcp closed smtp
    53/tcp closed domain
    80/tcp closed http
    110/tcp closed pop3
    111/tcp closed rpcbind
    135/tcp closed msrpc
    139/tcp closed netbios-ssn
    143/tcp closed imap
    443/tcp closed https
    445/tcp closed microsoft-ds
    993/tcp closed imaps
    995/tcp closed pop3s
    1723/tcp closed pptp
    3306/tcp closed mysql
    3389/tcp closed ms-wbt-server
    5900/tcp closed vnc
    8080/tcp closed http-proxy
  • using this command nmap --top-ports 20 127.0.0.1
    this will gave you that list and tell ya what ones is open .
    Hacking A Rise top20ports-300x218 Nmap Basic's part one Simple scan FEATURED Information Gathering Linux Pentesting Reconnaissance Reporting Tools sniffing and spoofing

    Right lads we leave it at that and im going for a coffee and enjoying rest me fathers day lol whoop whoop

    ALL THE BEST lAUGHINGMAN

    0 0
    Hacking A Rise b57300e9e62f2b0295a138eefa166abf?s=400&is-pending-load=1#038;d=mm&r=g Nmap Basic's part one Simple scan FEATURED Information Gathering Linux Pentesting Reconnaissance Reporting Tools sniffing and spoofing   Hacking A Rise b57300e9e62f2b0295a138eefa166abf?s=400&d=mm&r=g Nmap Basic's part one Simple scan FEATURED Information Gathering Linux Pentesting Reconnaissance Reporting Tools sniffing and spoofing

    About Post Author

    Laughingman

    Hi im the laughing man im a pentester and the owner of Hacking a rise
    0 %
    Happy
    0 %
    Sad
    0 %
    Excited
    0 %
    Angry
    0 %
    Surprise
    pentester
    Hi im the laughing man im a pentester and the owner of Hacking a rise

    Leave a Reply

    Your email address will not be published.