{"id":49,"date":"2017-12-16T12:54:31","date_gmt":"2017-12-16T07:24:31","guid":{"rendered":"http:\/\/blogs.shydrate.com\/?p=49"},"modified":"2017-12-16T12:58:03","modified_gmt":"2017-12-16T07:28:03","slug":"basics-of-nmap-network-mapper","status":"publish","type":"post","link":"http:\/\/blogs.shydrate.com\/index.php\/2017\/12\/16\/basics-of-nmap-network-mapper\/","title":{"rendered":"Basics of Nmap: Network Mapper"},"content":{"rendered":"<div>What is Nmap?<\/div>\n<div>Its a tool. A security scanner that is used to scan open ports, discover host and service that are running on the connected network.<\/div>\n<div>Its an open source. Its used for active and passive foot printing.<\/div>\n<div><\/div>\n<div>If you have heard footprinting for the first time and don\u2019t know what it is let me tell you what is footprinting and its type.<\/div>\n<div>Footprinting is a technique to gather information about system or the target. There are two type of footprinting<\/div>\n<div>1. Passive : Data is collected without owner\u2019s knowledge. Ex:Google, Job portals,Social media, etc<\/div>\n<div>2. Active : Data is collected by interacting with owner or someone who works for the organisation also known as Social Engineering. Ex: talking with former employee of the organisation or calling receptionist and impersonating as employee who lost his access card or forgot his login credentials, etc.<\/div>\n<div><\/div>\n<div>Now let me show you how to\u00a0 scan in nmap for particular ip.To know ip you can write ifconfig in linux and in windows type ipconfig.<\/div>\n<div><\/div>\n<div>1.\u00a0 This is simple ip scan in nmap<\/div>\n<div>\u00a0&#8216;nmap (ip address)\u2019 -&gt; Nmap 192.168.225.62<\/div>\n<div>Note: 192.168.225.62 is my ip address.<\/div>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-40 size-full\" src=\"http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/1.png\" alt=\"\" width=\"818\" height=\"498\" srcset=\"http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/1.png 818w, http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/1-300x183.png 300w, http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/1-768x468.png 768w\" sizes=\"auto, (max-width: 818px) 100vw, 818px\" \/><\/div>\n<div>Now let me try with other ip that I have connected to the same network<\/div>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-41 size-full\" src=\"http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/2.png\" alt=\"\" width=\"818\" height=\"498\" srcset=\"http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/2.png 818w, http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/2-300x183.png 300w, http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/2-768x468.png 768w\" sizes=\"auto, (max-width: 818px) 100vw, 818px\" \/><\/div>\n<div>So this time ip address will be changed \u2019nmap 192.168.225.159\u2019<\/div>\n<div>So the result will be as shown in image.Note that there is table which shows ports open and services running on that port<\/div>\n<div>And also if u are in the same network it will show the Mac address of the device.<\/div>\n<div><\/div>\n<div>\n<div>2.\u00a0 Now lets say that there are multiple IP address on the network that u want to scan then you can write this command<\/div>\n<div>&#8216;Nmap &lt;IP address&gt;\u00a0 &lt;IP address&gt;\u00a0 &lt;IP address&gt;&#8217;<\/div>\n<div>Nmap 192.168.225.62 192.168.225.159<\/div>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-42 size-full\" style=\"font-size: 1rem\" src=\"http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/3.png\" alt=\"\" width=\"818\" height=\"498\" srcset=\"http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/3.png 818w, http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/3-300x183.png 300w, http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/3-768x468.png 768w\" sizes=\"auto, (max-width: 818px) 100vw, 818px\" \/><\/div>\n<div>OR<\/div>\n<div>You can just write all the IP address in one file and just call that file on the nmap command<\/div>\n<div>&#8216;Nmap -iL &lt;filename.txt&gt;\u2019<\/div>\n<div>nmap -iL \/root\/Desktop\/test<\/div>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-47 \" src=\"http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/8.png\" alt=\"\" width=\"559\" height=\"346\" srcset=\"http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/8.png 577w, http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/8-300x186.png 300w\" sizes=\"auto, (max-width: 559px) 100vw, 559px\" \/><\/div>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-46 size-full\" src=\"http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/7.png\" alt=\"\" width=\"926\" height=\"624\" srcset=\"http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/7.png 926w, http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/7-300x202.png 300w, http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/7-768x518.png 768w\" sizes=\"auto, (max-width: 926px) 100vw, 926px\" \/><\/div>\n<div><\/div>\n<div>3.\u00a0\u00a0<span style=\"font-size: 1rem\">Now lets go with Aggression scan.<\/span><\/div>\n<div><span style=\"font-size: 1rem\">In Aggression scan you will get to know the OS used and its version and also scripts running and also trace route scan <\/span><\/div>\n<div><span style=\"font-size: 1rem\">&#8216;Nmap -A &lt;Target IP address&gt;\u2019 i.e, nmap -A 192.168.225.159<\/span><\/div>\n<div><\/div>\n<div><span style=\"font-size: 1rem\">The result is shown below. <\/span><\/div>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-44 size-full\" src=\"http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/5.png\" alt=\"\" width=\"818\" height=\"498\" srcset=\"http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/5.png 818w, http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/5-300x183.png 300w, http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/5-768x468.png 768w\" sizes=\"auto, (max-width: 818px) 100vw, 818px\" \/><\/div>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-45 size-full\" src=\"http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/6.png\" alt=\"\" width=\"926\" height=\"624\" srcset=\"http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/6.png 926w, http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/6-300x202.png 300w, http:\/\/blogs.shydrate.com\/wp-content\/uploads\/2017\/12\/6-768x518.png 768w\" sizes=\"auto, (max-width: 926px) 100vw, 926px\" \/><\/div>\n<div><span style=\"font-size: 1rem\">Note1:-\u00a0 \u00a0if you are using windows os you can opt for Zenmap, its GUI based and easy to install.<\/span><\/div>\n<div>Note2:-\u00a0\u00a0<span style=\"font-size: 1rem\">I have not covered OS detection and trace route scan and version scan and script as the result will be shown in Aggression scan<\/span><\/div>\n<\/div>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>What is Nmap? Its a tool. A security scanner that is used to scan open ports, discover host and service that are running on the connected network. Its an open source. Its used for active and passive foot printing. If<!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-49","post","type-post","status-publish","format-standard","hentry","category-my-articles"],"_links":{"self":[{"href":"http:\/\/blogs.shydrate.com\/index.php\/wp-json\/wp\/v2\/posts\/49","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/blogs.shydrate.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/blogs.shydrate.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/blogs.shydrate.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/blogs.shydrate.com\/index.php\/wp-json\/wp\/v2\/comments?post=49"}],"version-history":[{"count":3,"href":"http:\/\/blogs.shydrate.com\/index.php\/wp-json\/wp\/v2\/posts\/49\/revisions"}],"predecessor-version":[{"id":52,"href":"http:\/\/blogs.shydrate.com\/index.php\/wp-json\/wp\/v2\/posts\/49\/revisions\/52"}],"wp:attachment":[{"href":"http:\/\/blogs.shydrate.com\/index.php\/wp-json\/wp\/v2\/media?parent=49"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/blogs.shydrate.com\/index.php\/wp-json\/wp\/v2\/categories?post=49"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/blogs.shydrate.com\/index.php\/wp-json\/wp\/v2\/tags?post=49"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}