How To Use Nmap Security Scanner  (Nmap Commands)

how to use nmap commands

Nmap is a great security scanner. Many systems and network administrators use it for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. In this article, I’ll guide you through how to use Nmap commands.

Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.

How To Install Nmap

Nmap should be installed by default on your system, but if it isn’t, you can install it with the package manager of your distro. Also, you can install the GUI for nmap: Zenmap.
sudo apt-get install zenmap

Basic Nmap Scan

Scanning a single ip address:

  1. Scan an ip address:# nmap 192.168.100.1

nmap scan ip address

 2. Scan a host name:# nmap www.google.com

nmap scan host name

 3. Scan an ip and get more information:
# nmap -v 192.168.100.1

nmap scan ip

Nmap Commands To Discover Your LAN

If you want to make a simple scan you can try scanning your LAN.

  1. Typeifconfigas root to know the broadcast ip address.
  2. Search the Bcast ip in the active interface, for example, wlan0

search bcast ip address

 3. In my LAN the Bcast ip is: 192.168.100.255
4. Make an nmap scan to the LAN:
nmap -sP 192.168.100.1-254

make nmap scan to lan

 5. With this scan you can discover the hosts presents in your LAN.

Scanning multiple IP addresses With Nmap

  1. # nmap ip1 ip2 ip3

Example: 

# nmap 192.168.100.1 192.168.100.3

nmap how to scan multiple ip address

 2. Working with the same subnet:
# nmap 192.168.100.1,2,3

nmap working with subnet

 3. Scanning an ip range:
# nmap 192.168.100.1-5

nmap scanning an ip range

 4. Scanning an entire subnet:
# nmap 192.168.100.0/24

nmap scanning entire subnet

 5. Excluding hosts:
# nmap 192.168.100.1-5 --exclude 192.168.100.3

nmap excluding hosts

Working with Functional Options

  1. Detecting the OS

You must use the “A” option to detect the target’s operating system:

# nmap -A 192.168.100.1
Also, you can use the “O” option.

nmap detecting os

 2. Checking if the target is protected by a firewall
You must use the “sA” option to detect the target’s firewall:
# nmap -sA 192.168.100.1

nmap checking firewall status

 3. Discovering which devices are up
You must make a ping scan with the “sP” option: 
# nmap -sP 192.168.100.0/24

nmap up devices

 4. Performing a fast scan
If you want a fast scan you can use the “F” option:
# nmap -F 192.168.100.1

nmap performing fast scan

 5. Showing host interfaces and routers
Use the “iflist” option:
# nmap --iflist 192.168.100.3

nmap host interfaces and routers

Nmap Commands To Scan Ports

Nmap is able to recognize six port states: 1. open:
An application is actively accepting TCP connections, UDP datagrams or SCTP associations on this port.
 2. closed:
A closed port is accessible (it receives and responds to Nmap probe packets), but there is no application listening on it.
 3. filtered:
Nmap cannot determine whether the port is open because packet filtering prevents its probes from reaching the port.
 4. unfiltered:
The unfiltered state means that a port is accessible, but Nmap is unable to determine whether it is open or closed.
 5. open | filtered:
Nmap places ports in this state when it is unable to determine whether a port is open or filtered.
 6. closed | filtered
This state is used when Nmap is unable to determine whether a port is closed or filtered. It is only used for the IP ID idle scan.

Port Scanning Techniques

Option
Description
-sS (TCP SYN scan)
It can be performed quickly, scanning thousands of ports per second on a fast network not hampered by restrictive firewalls. It is also relatively unobtrusive and stealthy since it never completes TCP connections.
-sT (TCP connect scan)
TCP connect scan is the default TCP scan type when SYN scan is not an option. This is the case when a user does not have raw packet privileges.
-sU (UDP scans)
While most popular services on the Internet run over the TCP protocol, UDP services are widely deployed. Because UDP scanning is generally slower and more difficult than TCP, some security auditors ignore these ports.
-sY (SCTP INIT scan)
SCTP is a relatively new alternative to the TCP and UDP protocols, combining most characteristics of TCP and UDP, and also adding new features like multi-homing and multi-streaming. It is mostly being used for SS7/SIGTRAN related services but has the potential to be used for other applications as well.
-sN, -sF, -sX (TCP NULL, FIN, and Xmas scans)
These three scan types exploit a subtle loophole in the TCP RFC to differentiate between open and closed ports.
-sA (TCP ACK scan)
It is used to map out firewall rulesets, determining whether they are stateful or not and which ports are filtered.
-sW (TCP Window scan)
Window scan is exactly the same as ACK scan except that it exploits an implementation detail of certain systems to differentiate open ports from closed ones, rather than always printing unfiltered when a RST is returned.
-sM (TCP Maimon scan)
This technique is exactly the same as NULL, FIN, and Xmas scans, except that the probe is FIN/ACK.
–scanflags (Custom TCP scan)
The –scanflags option allows you to design your own scan by specifying arbitrary TCP flags.
-sI <zombie host>[:<probeport>] (idle scan)
This advanced scan method allows for a truly blind TCP port scan of the target (meaning no packets are sent to the target from your real IP address).
-sO (IP protocol scan)
IP protocol scan allows you to determine which IP protocols (TCP, ICMP, IGMP, etc.) are supported by target machines.

Using Zenmap

  1. Open Zenmap as root
  2. Enter the target
  3. Choose a profile, also you can type the scan in the command field or create a new profile
  4. Click “Scan”
  5. With Zenmap you can see the ports, host details, and topology of the scan
  6. Also, you can save your scan as xml

nmap how to use zenmap

This is a basic tutorial about Nmap, but this tool is very powerful, the number of things that you can do with Nmap is incredible. Also, you can find other powerful tools at Nmap’s website, and you can see the reference guide.

More information about Nmap

If you want to know more information visit: https://nmap.org/
Also, you can buy the book: https://nmap.org/book/

Leave a Reply

Your email address will not be published. Required fields are marked *

linux system administration bootcamp