Nmap Scanning: Andrew Fiade Andrew - Fiade@uinjkt - Ac.id
Nmap Scanning: Andrew Fiade Andrew - Fiade@uinjkt - Ac.id
Nmap Scanning: Andrew Fiade Andrew - Fiade@uinjkt - Ac.id
Andrew Fiade
Andrew_fiade@uinjkt.ac.id
Resource
Google keyword: nmap tutorial
Definisi
Nmap (Network Mapper) is an open source tool for network
exploration and security auditing. It was designed to rapidly
scan large networks, although it works fine against single
hosts. Nmap uses raw IP
packets in novel ways to determine what hosts are available
on the network, what services (application name and version)
those hosts are offering, what operating systems (and OS
versions) they are
running, what type of packet filters/firewalls are in use, and
dozens of other characteristics. While Nmap is commonly
used for security audits, many systems and network
administrators find it useful for routine
tasks such as network inventory, managing service upgrade
schedules, and monitoring host or service uptime.
Scan Single IP
Excluding hosts/networks
(IPv4)
When scanning a large number of hosts/networks
you can exclude hosts from a scan:
nmap 192.168.1.0/24 --exclude 192.168.1.5
nmap 192.168.1.0/24 --exclude
192.168.1.5,192.168.1.254
OR exclude list from a file called /tmp/exclude.txt
nmap -iL /tmp/scanlist.txt --excludefile
/tmp/exclude.txt