Nmap

From Wiki Hack Tools
Revision as of 23:03, 5 February 2023 by S4M Security (talk | contribs)
Nmap logo like above.
Nmap info from Wikipedia
Original author(s) Gordon Lyon (Fyodor)
Initial release September 1997; 25 years ago
Stable release 7.93 / 1 September 2022; 5 months ago
Repository https://github.com/nmap/nmap.git
Written in C, C++, Python, Lua
Operating system Cross-platform
Available in English
Type Network security
License NPSL or modified GPLv2 or proprietary
Website https://nmap.org
Command example "nmap -h"

What Is Nmap

Nmap (“Network Mapper”) is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. While Nmap is commonly used for security audits, many systems and network administrators find it useful for routine tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.

Reference: https://nmap.org/book/man.html#man-description

Where is using Nmap

Nmap is use in windows, Unix, Linux, MacOS, Android and other OS. Nmap is cross-platform software. Nmap run in the different OS.

How To Does Work Nmap

Nmap works by checking a network for hosts and services. Once found, the software platform sends information to those hosts and services which then respond. Nmap reads and interprets the response that comes back and uses the information to create a map of the network. The map that is created includes detailed information on what each port is doing and who (or what) is using it, how the hosts are connecting, what is and is not making it through the firewall, and listing any security issues that come up.

How is all of that accomplished? Nmap utilizes a complex system of scripts that communicate with every part of the network. The scripts act as communication tools between the network components and their human users. The scripts that Nmap uses are capable of vulnerability detection, backdoor detection, vulnerability exploitation, and network discovery. Nmap is an extremely powerful piece of software, but there does tend to be a good deal of background knowledge required to use it correctly.

Internet security companies can use Nmap to scan a system and understand what weaknesses exist that a hacker could potentially exploit. As the program is open-source and free, it is one of the more common tools used for scanning networks for open ports and other weaknesses. At Holm Security, we use this technology in a very effective way, as we provide an excellent web-based security service, which ensures that the clients’ ports remain securely closed to those not granted permission.

Reference: https://www.holmsecurity.com/blog/what-is-nmap

What Nmap Is Used For

Nmap not use for attack. Nmap is use for information gathering. Nmap is a powerful information gathering. The nmap using for active information gathering also powerfull use scanning data from server or client computer in network or website.

What Is Nmap Features

Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection. These features are extensible by scripts that provide more advanced service detection, vulnerability detection, and other features.

Reference: https://en.wikipedia.org/wiki/Nmap

Nmap Tool General Features
Feature Caption Feature Description
Host Discovery It can be used for the discovery of host devices in the common internet network.
Services Detection It can provide detailed information about the services and applications used on the devices in the common internet network.
OS Detection It can give the operating system information of the target system. Version, update information etc.
Device Detection It can output a list of devices in the same network and various information about devices.