Nmap

From Wiki Hack Tools
Revision as of 15:24, 5 February 2023 by S4M Security (talk | contribs) (Created page with "File:Nmaplogo.png|alt=Nmap general info from Wikipedia|thumb|Nmap logo above. {| |'''Original author(s)''' |Gordon Lyon (''Fyodor'') |- |'''Initial release''' |September 1997; 25 years ago |- |'''Written in''' |C, C++, Python, Lua |- |'''Repository''' |https://github.com/nmap/nmap |- |'''Operating system''' |Cross-platform |- |'''Available in''' |English |- |'''Type''' |Network security |- |'''License''' |NPSL or modified GPLv2 or proprietary |- |'''Website''' |https:/...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
File:Nmaplogo.png
Nmap logo above.
Original author(s) Gordon Lyon (Fyodor)
Initial release September 1997; 25 years ago
Written in C, C++, Python, Lua
Repository https://github.com/nmap/nmap
Operating system Cross-platform
Available in English
Type Network security
License NPSL or modified GPLv2 or proprietary
Website https://nmap.org/

What Is Nmap?

Nmap (“Network Mapper”) is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. While Nmap is commonly used for security audits, many systems and network administrators find it useful for routine tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.

Reference: https://nmap.org/book/man.html#man-description