Nmap Basic’s part one Simple scan

Welcome back to hacking arise lads Laughing Man here with a very basic understanding of some the commands in Nmap Free Security Scanner

What is Nmap network scanner

Nmap is a free and open-source network scanner created by Gordon Lyon. Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection Find out more

How To use Nmap

First let me start by saying i have Nmap install on my system but for people using termux type pkg install nmap this will install it on your termux as many os systems have it installed like Kali,parrot,cyborg hawk,black arch arch strike etc …

So see nmap full commands type Nmap in terminal or man nmap this gave you the manual for nmap in the terminal

note

some times when scanning you will be blocked this dont mean it dont work means the target not responding to the pings so if this happens use -Pn (eg nmap -Pn google.com and for IP’s nmap -Pn 127.0.0.1 )

simple scan

so this a simple command for a simple scan for ips or a website its easy just type nmap 127.0.0.1
well you wont be using the local host so if its a website put the url or if its a ip type it.

Post scanning

Right now lets move on to ways to find the ports we need so lets start by looking for a specific port this be port 80 so in terminal type nmap -p 80 127.0.0.1

so scanning one port is easy so lets scan two ports at one time so type nmap -p 80,433 127.0.0.1

now what we want to get all the ports on a ip or server we use this command nmap -p 1-9999 127.0.0.1

Ip Range

Now we move on two ip range scanning this help you nmap a network and see what devices are on it the two main commands for that are
nmap 127.0.0.1/28

or we can use this one nmap 127.0.0.1/14

what id we want to see everyone on the network we use the nmap 127.0.0.* this gave you everyone on the network 1 to 256

now lets take out a few ips to be excluded from the scan type nmap 127.0.0.* --exclude 127.0.0.1,127.0.0.2

top 20 ports

you way ask your self whats the top 20 ports well there

  • 21/tcp closed ftp
    22/tcp closed ssh
    23/tcp closed telnet
    25/tcp closed smtp
    53/tcp closed domain
    80/tcp closed http
    110/tcp closed pop3
    111/tcp closed rpcbind
    135/tcp closed msrpc
    139/tcp closed netbios-ssn
    143/tcp closed imap
    443/tcp closed https
    445/tcp closed microsoft-ds
    993/tcp closed imaps
    995/tcp closed pop3s
    1723/tcp closed pptp
    3306/tcp closed mysql
    3389/tcp closed ms-wbt-server
    5900/tcp closed vnc
    8080/tcp closed http-proxy
  • using this command nmap --top-ports 20 127.0.0.1
    this will gave you that list and tell ya what ones is open .

    Right lads we leave it at that and im going for a coffee and enjoying rest me fathers day lol whoop whoop

    ALL THE BEST lAUGHINGMAN

    pentester
    Hi im the laughing man im a pentester and the owner of Hacking a rise

    Leave a Reply

    Your email address will not be published. Required fields are marked *