Command line format: nmap-sS-sU-T4-A-v-PE-PP-PS80, 443-PA3389-PU40125-PY-g53--script default or (discovery and safe) 1916110 Through the above tutorials, you can master the basic use of Nmap and Zenmap and learn to use this professional IP and port scanning tool.
Use the nmap sP command for simple host discovery. Use the nmap PN command to skip the ping scan and scan directly the specified IP address range. Port scan: Use the nmap sS command to perform a TCP SYN scan, which is the default port scan method. Use the nmap sU command to perform a UDP scan. Use the nmap sT command to perform a TCP connection scan. Version detection: Use the nmap sV command to detect service version.
Download the Nmap installation package and log on to the Nmap official website download page at http://nmap.org/download.html#windows. To ensure software security, please try to download it from the official website. Find the download address that supports the Windows version on the download page and click Download. Nmap supports multiple platforms, such as Linux, Windows and Mac, and the corresponding version needs to be downloaded. After the installation Nmap download is complete, extract the installation package.
Install Nmap: Download: Search for "Nmap" through the search engine, find the official website or reliable download source, and download the installation package suitable for Win10. Installation: Double-click the installation package and follow the prompts to install. During the installation process, you usually just need to keep clicking "Next" to complete the installation. After the installation is successful, enter nmap on the command line interface. If the command can be executed, it means that the program was installed successfully.
Nmap (Network Mapper) is an open source network scanning and security audit tool, while Zenmap is Nmap's official GUI (Graphical User Interface). The following are the detailed steps for downloading and installing Nmap and Zenmap on Windows: Download Nmap and visit the official website: Open a browser and visit Nmap's official website: https://nmap.org/. Download the installation package: On the homepage of the official website, click the "Download" button.
Nmap Usage Tutorial: Basic use of port scanning: Enter nmap on the command line and follow the target IP address. For example, nmap 19163180 will scan 1000 ports by default and display the number of open and closed ports. Specify scan specified ports: You can use the p parameter to specify a single or range of ports to scan, such as nmap p 80, 443. Scanning method: TCP full connection scanning: Use the sT parameter to confirm the three-way handshake.


View the basic syntax View help information: Command: nmap or nmap--help Role: Displays the basic usage and available parameters of Nmap. Common parameters: -iL: Batch scanning of the text IP content of the file, followed by the IP text file. -- exclude: Remove and scan certain IPs. -- excludefile: Excludes IPs in scanned text files.

Requirements for basic environment preparation system: Kali Linux virtual machine needs to be installed. The system is pre-installed with Nmap and common penetration testing tools. Target setting: Clarify the scanning object (such as IP address 191630) to ensure normal network connectivity.
show options start scanning: run key points summarize SSH configuration risks: Allowing root login and password authentication significantly increases the risk of being attacked. Comparison of scanning tools: Nmap is suitable for fast basic scanning. Metasploit provides modular vulnerability detection and is more scalable. Modular operation: Metasploit lowers the threshold for use through the standardized process of use, set, and run.
- n: Disable DNS reverse resolution to speed up the scanning process. -- min-hostgroup 1024: When scanning a large number of IPs, groups the targets into 1024 IPs for serial scanning. -- min-parallelism 1024: Set the minimum number of parallel probes to make full use of network resources. - oX nmap_output.xml: Outputs the results as an XML format file for subsequent analysis.
Common commands: Scan for surviving hosts on network segment 1735. The command is as follows: nmap-T4-sn1730/24. Among them, -T4 means to use a faster scanning speed, -sn means to only perform host discovery without port scanning, and 1730/24 means the range of network segments to be scanned. Precautions: When conducting host discovery, you should ensure that you have sufficient authority and comply with relevant laws and regulations to avoid scanning unauthorized networks.

The command for nmap scanning ports is: nmap-PS ip address. Use this command to scan the port address opened by the target address. The nmap scanner has three main basic functions: one is to detect whether a group of hosts is online, the second is to scan the host port, sniff the network services provided, and can also infer the operating system used by the host.
The basic command should be used for ping scanning: nmap-sP19160 only displays the responding hosts and does not conduct further testing. Only surviving hosts are listed: nmap-sL19160/24 does not send data to the target. Specify port scanning: nmap-PS 22, 23, 25, 80 191612227 for specific ports.
Install Nmap Download the version that suits your operating system from the official website and follow the instructions to install it. Basic use Open a terminal or command prompt: This is the environment for executing the Nmap command. Check the installation: Enter the "nmap" command to make sure it works properly. Basic scanning: Scan using the syntax "nmap [scan target]", where the scan target can be an IP address, domain name, or network range.
Get the IP and subnet mask of the local network interface and open the terminal using ifconfig (legacy system), enter the command: ifconfig looks for the target network interface (such as eth0, wlan0) in the output, and records its inet (IPv4 address) and netmask (subnet mask).
Common commands for viewing IP addresses in Linux are as follows: ip a s or ip addr show This is the most commonly used modern command and is used to display details of all network cards, including virtual network cards. After execution, the output will list all network cards (such as en0, em4, etc.), where the value corresponding to the inet field is the IPv4 address, and inet 6 is the IPv6 address.

Next, use UDP ping to probe hosts, which helps identify hosts that respond only to UDP. The command is as follows: nmap-PU19160/24 This command also scans the 19160/24 network segment, but specifically checks UDP responses. In order to obtain more detailed information, such as the MAC address of the host, you can use the arp cache table in conjunction.

You can check your local network configuration file to determine your IP address, subnet mask and other information, and then calculate the network segment you are in. Use command-line tools. For example, the nmap tool commonly used in Linux systems can scan a specified IP range.
Perform a ping scan and print out the hosts that responded to the scan. Probes hosts using UDP ping. The scan option with the highest frequency (SYN scan, also known as semi-open scan) performed quickly. After scanning, check the arp cache table to obtain the IP address of the local area network host.
Query the IP address in use in the local area network can be achieved through the following two common methods: Log in to the gateway switch to view ARP information Principle: The terminal needs to set the gateway address to access the Internet, and the first-hop device (gateway switch) for data forwarding will record the ARP information of the terminal, that is, the correspondence table between MAC address and IP address. Operation steps: Confirm the device type: You need to log in to the gateway switch (the access switch does not record IP information).
发表评论