Knowledge innovation Lab
A place where new ideas are experimented with and developed.
Elevate Your Career with SaturnX Academy's Innovative Professional Courses, Mail Us : info@saturnxacademy.com
A place where new ideas are experimented with and developed.
By Rudraksha
Last updated on Jul 29, 2024
SaturnX Academy stands out as the premier training institute in Kolkata, Hooghly, Uttarpara, West Bengal, and all of India for Cyber Security, Ethical Hacking, and Digital Forensics. SaturnX Academy's Cyber Security and Digital Forensics Division is at the forefront of education with its future-ready courses and cutting-edge AI-integrated modules. With a focus on equipping students with advanced skills, SaturnX Academy stands out as a premier institute for mastering cybersecurity and digital forensics. The curriculum is designed to meet the evolving demands of the industry, ensuring graduates are well-prepared for emerging challenges. Choose SaturnX Academy for unparalleled expertise and innovative training in cybersecurity and digital forensics. For more details is cyber security courses.
What is Nmap?
There are five phases of ethical hacking, with scanning being the first. Numerous popular tools are used for scanning:
Nmap is an open source tool used for network research and security auditing. It is powerful yet easy to use and offers a wide range of features such as host detection, port scanning, version detection and operating system fingerprinting.
NMAP (Network Mapper) is one of the most popular and powerful open source tools that allows cybersecurity professionals and network administrators to scan and analyze networks, identify vulnerabilities, and gather valuable information to improve network security. As we saw in the first step of this hack, the scan has truths like Agressive, Aggressive, OS, Tcp, Udp, Ping, Noping etc.
Nmap serves various purposes, such as:
Network Inventory: Discovering devices on a network.
Service Discovery: Identifying services running on different ports.
Security Auditing: Detecting vulnerabilities in systems.
Network Monitoring: Tracking changes in the network.
Penetration Testing: Assessing the security of a network by simulating attacks.
While Nmap comes pre-installed with Kali Linux, if you need to install or update it, you can use the following command:
sudo apt-get install nmap
Simple Port Scan
The simplest form of Nmap scanning is to scan for open ports on a target.
Definition: A port scan identifies open ports on a target.
Syntax: nmap [target]
Example: nmap 192.168.1.1
Specific Ports Scan
Definition: Scans specified ports.
Syntax: nmap -p [port(s)] [target]
Example: nmap -p 80 192.168.1.1
Service Version Detection Scan
Definition: Detects versions of services running on open ports.
Syntax: nmap -sV [target]
Example: nmap -sV 192.168.1.1
UDP (User Diagram Protoco)Scan
Definition: Scans for open UDP ports.
Syntax: nmap -sU [target]
Example: nmap -sU 192.168.1.1
Verbose Scan
A verbose scan in Nmap provides detailed output about the scanning process,giving more insight into the activities and results.
Definition:verbose scan is used to scan deeply and forcefully
Syntax : nmap –v [target]
Example: nmap -v 192.168.1.1
Aggressive Scan
An aggressive scan combines various Nmap features to gather detailed information.
Definition: Combines OS detection, version detection, script scanning, and traceroute.
Syntax: nmap -A [target]
Example: nmap -A 192.168.1.1
List Scan
List Scan (-sL): The List Scan generates and lists IP addresses or hostnames without sending any packets to the targets.
Definition: This scan is used to know the host name
Syntax : nmap -sL [target]
Example: nmap -sL 192.168.1.1
ACK or Acknowledgement Scan
An ACK scan is a specific type of scan used in network discovery and security auditing. It is designed to map out firewall rulesets and determine whether a firewall is stateful or stateless. It can also be used to identify filtered ports.
Definition: An ACK scan is used to determine whether ports are filtered or unfiltered. It sends TCP ACK packets to the target,
and based on the response, it can infer the presence of stateful firewalls or access control lists (ACLs).Use to know the firewall is active or not
Syntax : nmap -sA [target]
Example: nmap -sA 192.168.1.1
File containing a list of targets to scan
The -iL option in Nmap is used to specify a file containing a list of targets to scan.
Definition: -iL (Input List): This option allows you to input a file that contains a list of IP addresses or hostnames to scan. Each line in the file should contain a single IP address or hostname.
Syntax : nmap -iL [file]
Example: nmap -iL 192.168.1.1
Operating System Detection scan
Nmap can also attempt to determine the operating system of a target.
Definition: Detects the operating system running on a target.
Syntax: nmap -O [target]
Example: nmap -O 192.168.1.1
Full TCP Connect Scan
Definition:The -sT option in Nmap initiates a Full TCP Connect Scan. This scan completes the full TCP three-way handshake to determine whether a port is open.
Syntax: nmap -sT [target]
Example: nmap -sT 192.168.1.1
IPv6 Scanning
Definition: Scans IPv6 targets.
Syntax: nmap -6 [target]
Example: nmap -6 fe80::a00:27ff:fe94:44d1.
SaturnX Academy stands out as the premier training institute in Kolkata, Hooghly, Uttarpara, West Bengal, and all of India for Cyber Security, Ethical Hacking, and Digital Forensics. With its expert instructors and innovative curriculum, SaturnX Academy delivers top-notch education tailored to the demands of the cybersecurity industry. Students benefit from hands-on experience and cutting-edge techniques, ensuring they are well-equipped for future challenges. For unparalleled expertise in these crucial fields, SaturnX Academy is the leading choice.