CCNP – Page 3 – POFTUT

Category: CCNP


Nmap Host Discovery with Examples

Nmap is popular tool used by pentesters, system administrators and network administrators. Nmap provides a lot of features for free. In this tutorial, we will look host discovery features and options of nmap. Discover with Ping Scan One of the basic usages for Host discovery is Ping scan. Ping uses ICMP protocol to communicate with targets. Targets generally responses Ping r ICMP requests which show the remote system is up....


How To Scan TCP and UDP Ports With Nmap?

Nmap is very popular tool among pentester and system/network administrators. We have all ready provided different nmap tutorials and cheat sheet but TCP and UDP port scan is important part of the scan. We will dive in detail in this tutorial. Start Port Scan The most simple usage without any parameter for a port scan is just providing the target. The target can be a single IP or hostname or...


Nmap Commands Cheat Sheet

Nmap is the most popular tools used in penetrations test or assessments for network scanning. Nmap have another features like listing some basic vulnerabilities and protocol related details. We will look Nmap features in fast way. For more detailed information read following tutorial. Nmap Tutorial Target Selection Target is the remote system nmap will scan. Scan Single Ip

Scan A Host

Scan A Range of IP



Nmap Tutorial Index

Nmap Tutorial Index Introduction To Network Scanning with Nmap Nmap Installation (Ubuntu, Centos, Fedora, Windows) Nmap Target Specification Nmap Host Discovery Nmap Port Scan (TCP, UDP, ACKi SYNC,..) Nmap Port Specification and Scan Order Nmap Script and Version Scan Nmap Operating System Detection Nmap Timing and Performance Nmap Output


Tcp and Udp Port List, Names and Usage Frequency

Nmap tool provides popular ports list as a database where this list is also used in network and service scans. Here is the list but before we will look the command which will list ports according to the popularity. Nmap Top Ports Listing We can use sort command in order to list ports according to their usage frequency. The nmap port or service database located at /usr/share/nmap/nmap-services . We provide -k3 which specifies...


Nmap Output

[rps-include post=6632] Output is important part of a scan because all gathered information will be shown. According to output next steps will be decided. In this chapter we will look nmap output features. Normal Output To A File Normal output is the default output which is normally written to the console. This output can be saved into  file with -oN option.

XML Output To A File XML output is an other...


Nmap Timing and Performance

[rps-include post=6632] Performance is important part of the scan. Nmap developers always looks for optimized and adjustable performance options. Adjustable scan performance is important because scanning big networks will require a lot of time to complete job. As a security analyzer or pentester time is important for us. Set Host Group Count Nmap have the ability to scan multiple hosts in parallel. This is done by dividing target to the...


Nmap Operating System Detection

[rps-include post=6632] One of the most popular feature of nmap is its Operating System detection from network packets values. To get reliable detection result at least one port of the target should be open. Enable Operating System Detection Operating system (OS) detection can be enable with -O . On the other side -A parameter also provides operating system information. To use operating system detection nmap command should be run with root privileges because lower...


Nmap Script and Version Scan

[rps-include post=6632] Nmap provides script scanning which gives nmap very flexible behavior to get more information and test about the target host. This feature is called Nmap Scripting Engine (NSE). NSE gives user the ability to write scripts for test. Lua is programming language supported by NSE. NSE have some vulnerability detection scripts too. NSE have categories to make things tidy.  Here are these categories auth is used to authentication related...


Nmap Port Specification and Scan Order

[rps-include post=6632] Port specification is important part of the scan. We should set port scope carefully because wrong scope will make our result vulnerable to false and long for time. Specify Ports As we know tcp and udp protocols have port numbers from 0 to 65535. There are default values for some scans but we can specify the target ports with this parameter.

-p will specify ports 22, 80, 443...

Enjoy this blog? Please spread the word :)