3 Nmap
3 Nmap
3 Nmap
Aim of experiment : Download and install nmap. Use it with different options to scan open
ports, perform OS fingerprinting, do a ping scan, tcp port scan, udp port scan, etc.
Objective of experiment: Objective of this module to learn nmap installation & use this to scan
different ports.
Scope : Used for ip spoofing and port scanning.
Technology: Networking
Theory:
Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and
security auditing. Many systems and network administrators also find it useful for tasks such as
network inventory, managing service upgrade schedules, and monitoring host or service uptime.
Nmap uses raw IP packets in novel ways to determine what hosts are available on the network,
what services (application name and version) those hosts are offering, what operating systems
(and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of
other characteristics. It was designed to rapidly scan large networks, but works fine against
single hosts. Nmap runs on all major computer operating systems, and official binary packages
are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap
executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible
data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff),
and a packet generation and response analysis tool (Nping).
Nmap features include:
Host discovery Identifying hosts on a network. For example, listing the hosts that
respond to TCP and/or ICMP requests or have a particular port open.
Scriptable interaction with the target using Nmap Scripting Engine (NSE) and Lua
programming language
Syntax:
The maximum number of decoys (as defined in nmap.h) is 128. This is a very high
maximum that probably won't be exceeded in normal use. If too many decoys are used
during a scan, the performance will decrease as the remote host throttles network traffic
or if it is overwhelmed.This feature is best used when the destination device is not on the
same IP subnet as the nmap station. Although the IP addresses are spoofed, the MAC
address of the nmap station will not be spoofed. Close examination of a network trace file
on the nmap subnet will clearly show the real hardware address of the spoofed IP
addresses.
The decoy option is a good example of how "active filtering" can become a detriment on
a production network. If decoy stations are used to scan a device, an active firewall
reconfiguration or active IPS blocking may prevent legitimate traffic from traversing the
network. An overly aggressive active filtering profile can inadvertently create selfinflicted denial of service attacks! This nmap scan can assist network teams with testing
and tuning of existing systems to help prevent these situations from occurring.
Nmap commands:
1. Scan system with Hostname and IP address.
6.