NMAP - Note My Abstract Ports! - HACKLIDO
NMAP - Note My Abstract Ports! - HACKLIDO
NMAP - Note My Abstract Ports! - HACKLIDO
- HACKLIDO
❆ 1 of 2 posts
(
Share
❅ Level 1
thexssrat (/u/thexssrat) 2 days ago Edited
❅ ❆
Home Tags
(/) (/tags) Log In
https://hacklido.com/d/128-nmap-note-my-abstract-ports 1/7
12/20/22, 10:26 AM NMAP: Note My Abstract Ports! - HACKLIDO
❆
(
❅ ❅
Introduction
Nmap= network mapper
❅
Nmap is a free and open source tool that many hackers keep handy in their tool belts. It’s often our first weapon of choice as recon is very
important and we can’t know what to investigate if we don’t even know what ports are open on our server.
Ports
❅talk about both UDP and TCP ports. There is a big difference between
When i talk about ports, i can
❆ these two protocols but to keep it
simple, TCP packages always give a confirmation making it so that every
Tagspackage surely gets delivers. This takes time as the server has to
Home
(/)
wait for the confirmation for every single package. UDP tries to get(/tags)
rid of that by simply sending the packages and not waiting for
https://hacklido.com/d/128-nmap-note-my-abstract-ports 2/7
12/20/22, 10:26 AM NMAP: Note My Abstract Ports! - HACKLIDO
confirmation.
❆
( TCP is often used in applications where it’s very important all packages get delivered in the exact order. For example if you download a file,
that will probably be done in the TCP protocol whereas a youtube video will probably be sent through a port via UDP.
I keep talking about everything but Nmap it seems but to understand what it does, we need to understand these basic concepts first. It’s ❆
really important to know there are 65,535 ports that a server can have in use.
Closed
A closed port is pretty useless to us as hackers, we can access it but there is nothing running it, basically an empty pit that we can stuff
too. ❅
Filtered
A filtered port is mostly a mystery to us. How Nmap works is it sends a probe to a port and waits for a reply but in case of a filtered port,
a package filter is preventing our probe from reaching our target. These ports are very frustrating to an attacked because they provide
very little information.
❅ ❆
Home Tags
(/) (/tags)
https://hacklido.com/d/128-nmap-note-my-abstract-ports 3/7
12/20/22, 10:26 AM NMAP: Note My Abstract Ports! - HACKLIDO
Others ❆
(
There are some other statuses as well but they are less prevalent while pentesting and can be found in the Nmap documentation or the help
pages.
Unfiltered ❆
open|filtered
closed|filtered
https://nmap.org/book/man-port-scanning-basics.html (https://nmap.org/book/man-port-scanning-basics.html)
nmap 10.10.10.10
When we add the -sV flag, Nmap will automatically try to grab the banners wherever possible. Every application that runs on a network port
broadcasts a banner unless the administrators disabled it. Nmap will also try to grab the version of the software running to give you a
better overview of where to look and how to exploit it possibly. We can use this data and go to exploit-db to find our exploit and execute a
PoC.
❅ ❆
Home Tags
(/) (/tags)
https://hacklido.com/d/128-nmap-note-my-abstract-ports 4/7
12/20/22, 10:26 AM NMAP: Note My Abstract Ports! - HACKLIDO
❆
nmap -sV --version-intensity 9 10.10.10.10
(
If we add the –version-intensity flag, we can make Nmap’s version identifying probes either more or less likely to identify the correct
version of software but ofcourse a higher level of intensity will take a lot longer.
❆
❅ ❅
nmap -sC 10.10.10.10
4 Reply
Create your account today and explore more content on this platform. You can also start blogging and be inspiration for others 😎
❅ ❆
Signup
Home Tags
(/) (/tags)
https://hacklido.com/d/128-nmap-note-my-abstract-ports 5/7
12/20/22, 10:26 AM NMAP: Note My Abstract Ports! - HACKLIDO
Level 0
King_Leviathan (/u/King_Leviathan) 2 days ❆
(
K ago
Thanks
Reply
❆
Write a Reply...
❅ ❅
My Recon methodology and tools for bug bounty and web 2.1K
(/u/0xManan) security
Web Security CTFs $ Bug Bounty
0xManan replied 4 days ago
tips&tricks
❅
Whoami??? Greetings, Amazing People. I’m Manan Patel, and I’m an Indian security researcher (Gujarat). In this blog, I’ll discuss My
Recon Tools, which were a great aid to me ...
(/d/110-my-recon-methodology-and-tools-for-bug-bounty-and-web-security)
https://hacklido.com/d/128-nmap-note-my-abstract-ports 6/7
12/20/22, 10:26 AM NMAP: Note My Abstract Ports! - HACKLIDO
(/d/40-writing-build-script-to-setup-our-vm)
❆
(
How I Got My First Reflected XSS Bug Bounty! 1.0K
https://hacklido.com/d/128-nmap-note-my-abstract-ports 7/7