Jump to content

Nmap: Difference between revisions

1,745 bytes added ,  5 February 2023
no edit summary
No edit summary
No edit summary
Line 37: Line 37:
Nmap (“Network Mapper”) is an open source tool for network    exploration and security auditing.  It was designed to rapidly    scan large networks, although it works fine against single    hosts. Nmap uses raw IP packets in novel ways to determine what    hosts are available on the network, what services (application    name and version) those hosts are offering, what operating systems    (and OS versions) they are running, what type of packet    filters/firewalls are in use, and dozens of other    characteristics.  While Nmap is commonly used for security audits,    many systems and network administrators find it useful for routine    tasks such as network inventory, managing service upgrade    schedules, and monitoring host or service uptime. <blockquote>Reference: https://nmap.org/book/man.html#man-description</blockquote>
Nmap (“Network Mapper”) is an open source tool for network    exploration and security auditing.  It was designed to rapidly    scan large networks, although it works fine against single    hosts. Nmap uses raw IP packets in novel ways to determine what    hosts are available on the network, what services (application    name and version) those hosts are offering, what operating systems    (and OS versions) they are running, what type of packet    filters/firewalls are in use, and dozens of other    characteristics.  While Nmap is commonly used for security audits,    many systems and network administrators find it useful for routine    tasks such as network inventory, managing service upgrade    schedules, and monitoring host or service uptime. <blockquote>Reference: https://nmap.org/book/man.html#man-description</blockquote>


= Where is using Nmap? =
=== Where is using Nmap ===
Nmap is use in windows, Unix, Linux, MacOS, Android and other OS. Nmap is cross-platform software. Nmap run in the different OS.
 
=== How To Does Work Nmap? ===
Nmap works by checking a network for hosts and services. Once found, the software platform sends information to those hosts and services which then respond. Nmap reads and interprets the response that comes back and uses the information to create a map of the network. The map that is created includes detailed information on what each port is doing and who (or what) is using it, how the hosts are connecting, what is and is not making it through the firewall, and listing any security issues that come up.
 
How is all of that accomplished? Nmap utilizes a complex system of scripts that communicate with every part of the network. The scripts act as communication tools between the network components and their human users. The scripts that Nmap uses are capable of vulnerability detection, backdoor detection, vulnerability exploitation, and network discovery. Nmap is an extremely powerful piece of software, but there does tend to be a good deal of background knowledge required to use it correctly.
 
Internet security companies can use Nmap to scan a system and understand what weaknesses exist that a hacker could potentially exploit. As the program is open-source and free, it is one of the more common tools used for scanning networks for open ports and other weaknesses. At Holm Security, we use this technology in a very effective way, as we provide an excellent web-based security service, which ensures that the clients’ ports remain securely closed to those not granted permission.<blockquote>Reference: https://www.holmsecurity.com/blog/what-is-nmap</blockquote>