Nmap (Network Mapper) is an open-source tool for port and network service scanning.
What is Nmap?
Nmap is a security tool that allows discovering hosts and services on a network, as well as identifying vulnerabilities.
Main Features
Port Scanning
- **TCP": TCP scanning
- **UDP": UDP scanning
- **SYN": SYN scanning
- **ACK": ACK scanning
Service Detection
- **Version detection": Version detection
- **OS detection": Operating system detection
- **Scripts": NSE scripts
- **Vulnerabilities": Vulnerability detection
Network Scanning
- **Host discovery": Host discovery
- **Port scanning": Port scanning
- **Service detection": Service detection
- **OS fingerprinting": OS fingerprinting
Basic Commands
Simple Scanning
Advanced Scanning
Port Scanning
NSE Scripts
Security Scripts
Specific Scripts
Use Cases
Security Auditing
- **Inventory": Asset inventory
- **Vulnerabilities": Vulnerability identification
- **Services": Service identification
- **Ports": Open port identification
Network Monitoring
- **Availability": Verify service availability
- **Changes": Detect network changes
- **Inventory": Maintain updated inventory
- **Compliance": Verify compliance
Penetration Testing
- **Reconnaissance": Reconnaissance phase
- **Scanning": Target scanning
- **Enumeration": Service enumeration
- **Vulnerability assessment": Vulnerability assessment
Best Practices
Ethical Use
- **Authorization": Obtain authorization
- **Scope": Define scan scope
- **Documentation": Document activities
- **Responsibility": Take responsibility
Techniques
- **Stealth": Use stealth techniques
- **Timing": Adjust scan timing
- **Fragmentation": Use fragmentation
- **Decoy": Use decoys
Analysis
- **Results": Analyze results
- **False positives": Identify false positives
- **Correlation": Correlate with other data
- **Documentation": Document findings
Related Concepts
- Ethical Hacking - Methodology that uses Nmap
- Penetration Testing - Technique that uses Nmap
- Vulnerability Assessment - Assessment that includes Nmap
- Nessus - Scanner complementary to Nmap
- Metasploit - Framework that uses Nmap
- Firewall - Device that Nmap can test
- VPN - Connection that Nmap can analyze
- VLAN - Segment that Nmap can scan
- Routers - Devices that Nmap identifies
- Switches - Devices that Nmap scans
- Logs - Nmap scan logs
- Dashboards - Nmap results visualization