![]() ![]() Especially when the network to be analyzed is an internal network.įinally, using the nmap command is not complex but the many options can overwhelm some users. Although it is also used by programmers to know if any application is using a specific port but this goes beyond this and it is possible to find more information about the host or even about the network. The nmap tool is a basic utility for many people working on Linux, especially in networking. In the same way, you can scan a port of the UDP protocol in a similar way to TCP. We also have the option to scan UDP ports, for this the option to use is the sU option. In this case, I am checking port 80, but it can be any port you want. In this way, you will be scanning all the ports that make use of the TCP protocol on a given host.Īlso, you can specify a port of this protocol: nmap -p T:80 192.168.2.124 In case you want to scan all TCP ports you can do it with the following command nmap -sT 192.168.2.124 This is a simple way to check if a given service is using a given port. This way you will scan ports 80 and 443 but they can be as many as you want but separated by commas.Īlso, you can scan a range of ports by using the - sign nmap -p 80-90 192.168.1.5 Or scan several ports simultaneously: nmap -p 80,443 192.168.1.11 For this example, I will choose port 80 which is one of the most commonly used ports. One of the most interesting options offered by nmap is that you can scan a specific port. Sudo nmap -sA 192.168.1.32 Working with ports This option is quite useful to find out when a machine is being used, just include the -sn options It is possible to perform a quick scan when required, you have to use the -F option nmap -F 192.168.1.34ĭetect the active hosts within a network. This way, you can check many addresses at once. On the other hand, you can also scan an entire range of IP addresses. However, you can scan multiple hosts by separating them by a blank space. If you add the -v option you can have more detailed output. In this output screen, you will be able to know the latency, available ports, and services that make use of it. ![]() Nmap done: 1 IP address (1 host up) scanned in 16.05 seconds ![]() Other addresses for (not scanned): x.x.x.x You will get an output similar to this: Starting Nmap 7.70 ( ) at 13:59 -04 The most basic way the command works is to use it to scan a host defined by IP address or domain. In the case of Debian, Ubuntu, and derivatives, you can install it with the following command: sudo apt install nmapīut if you use Fedora, CentOS 8, Rhel 8, and derivatives: sudo dnf install nmapīut on distributions like Arch Linux, Manjaro, and derivatives: sudo pacman -S nmapįinally, for OpenSUSE: sudo zypper in nmapĪs it is quite light, the installation will be very fast. But, the package is available in the official repositories of almost all of them so the installation is quite easy. In general, this tool is not present by default in the installations of the main Linux distributions. Also, Nmap has been used to scan huge networks of literally hundreds of thousands of machines. Nmap supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles. This tool is widely used throughout the Linux world but also has versions for macOS, Windows, and other Unix systems. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap (“Network Mapper”) is a free and open-source utility for network discovery and security auditing. Introducing to NmapĪccording to the tool’s website, we find the following definition: That is why we have prepared this post with the intention that you learn how to use the nmap command in Linux. That is why the more information we have about this command the better. One of the commands that have become essential for many sysadmin and Linux professionals is the nmap command. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |