Nmap Tutorial In Backtrack And Kali Linux

Hello Friends Today's Topic is on NMap Scanning,uses,Advantages and Commands With Explanations


Nmap (Network Mapper) is a security scanner used to discover hosts and services on a computer network, thus creating a "map" of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyses the responses. Unlike many simple port scanners that just send packets at some predefined constant rate, Nmap accounts for the network conditions during the run.
Nmap has been able to extend its discovery capabilities beyond simply figuring out whether a host is up or down and which ports are open and closed
NMAP can determine the 
v operating system of the target
v Names and Versions of the listening services
v Estimated uptime
v Type of device
v Presence of firewall

Nmap runs on 
v Linux
v Microsoft Windows
v Solaris
v Hp-UX
v BSD Or Macintosh Or MAC
 Linux is the most popular Nmap platform with Windows following it closely

Download Links of Backtrack on Torrents Because Backtrack is Officially Removed Because Reborn of it has Been Created Called Kali Linux
Backtrack 3 => Click Here
Backtrack 4 => 
Click Here
Backtrack 4 r1 => 
 Click Here
Backtrack 4 r2 => 
 Click Here
Backtrack 5 => 
Click Here
Backtrack 5 r1 => 
 Click Here
Backtrack 5 r2 => 
Click Here
Backtrack 5 r3 BlackHat Edition => 
Click Here
Click Here
Click Here To Download Kali Linux – www.Kali.org/Downloads

Nmap features include:

·        Host DiscoveryIdentifying hosts on a network. For example, listing the hosts which respond to pings or have a particular port open.
·        Port Scanning Enumerating the open ports on one or more target hosts.
·        Version DetectionInterrogating listening network services listening on remote devices to determine the application name and version number
·        OS Detection Remotely determining the operating system and some hardware characteristics of network devices.
·        Scriptable interaction with the target – using Nmap Script Engine


1) Open Terminal
2) Type Nmap

When you press enter Nmap Starts running and you can see all the command of Nmap but there will be no clear explanation of commands. Those commands cannot be understood by all

So Here I will show you all the commands and how to use them and what are they used for

Ø To scan IPS in range and to check how many are alive, The Command is

                           nmap -sP

Ø To Scan Ip In Specific Range, The Command is        

                           nmap -sP

          Range is 99 to 106, just for example

Ø To See How Many ports are open, we can do Stealth Scan, The Command For it is

nmap -sS

Ø To Find The Running Operating System on the Victim Ip

nmap -O

Ø To Scan TCP Connect, The Command Is

          nmap -sT

Ø To make a null scan to check weather ip is alive or not, the command is

                              nmap -sN

Ø To scan for UDP connect, The Command is

                                 nmap -sU 

Ø To scan for IP Protocol, The command is 

                      nmap -sO

Ø To check  Acknowledgement (ACK), The Command is 

  nmap -sA

Ø  To Scan for which windows is running, The command is

                     nmap -sW

This is a simple way to scan and find vulnerabilities 

=========  Hacking Don't Need Agreements   =========
Just Remember One Thing You Don't Need To Seek Anyone's Permission To Hack Anything Or Anyone As Long As It Is Ethical, This Is The Main Principle Of Hacking Dream
            Thank You for Reading My Post, I Hope It Will Be Useful For You

I Will Be Very Happy To Help You So For Queries or Any Problem Comment Below Or You Can Mail Me At BhanuHacks@gmail.com

Bhanu Namikaze

Bhanu Namikaze is an Ethical Hacker, Security Analyst, Blogger, Web Developer and a Mechanical Engineer. He Enjoys writing articles, Blogging, Debugging Errors and Capture the Flags. Enjoy Learning; There is Nothing Like Absolute Defeat - Try and try until you Succeed.

No comments:

Post a Comment