Kali Linux Tutorials - NMAP - Network Scanning Tool - Kali Linux Tools
What is Network Scanning ?
- A Network Scanning is an important part of network, which is the process used to detect active hosts on network and also used to find few information about the hosts like OS, Apps, Active ports, Services.
- These can be used for the purpose of following terms,
- Network & System inventory
- Compliance testing
- Security auditing
- Asset Management
What is NMAP ?
- NMAP-Network Mapper, which is a security scanner. It is introduced by Gordon Lyon.
- This Mapping tool is used to find host & Services on a network.
- It was 1st published in the year 1997, in an article of phrack magazine.
- The next year 1998, Nmap 2.00 is released which includes Operating system and Finger print.
- This tool comes under the Ethical hacking tutorial.
Alternatives of NMAP Network Scanning Tool :
Fing
- It is used to find out which devices are connected to wifi any network.
- Detect intruders.
- Troubleshoot network problems.
- Access network security risk.
Learn Ethical Hacking - Ethical Hacking tutorial - Fing Tool - Ethical Hacking examples - Ethical Hacking programs
Advanced ip scanner
- It is used to show all network devices.
- Access to shared folders.
- Remotely Switch off the computers.
Learn Ethical Hacking - Ethical Hacking tutorial - Advanced Ip Scanner - Ethical Hacking examples - Ethical Hacking programs
Advanced port scanner
Learn Ethical Hacking - Ethical Hacking tutorial - Advanced Port Scanner - Ethical Hacking examples - Ethical Hacking programs
Masscan
- It is Fast Software which is used for internet port scanner.
- Scan the whole internet within 6 minutes.
- Transmit 10 million packets per second.
Learn Ethical Hacking - Ethical Hacking tutorial - Masscan Tool - Ethical Hacking examples - Ethical Hacking programs
Steps Involved in Network Scanning
Step 1:
- Open Terminal
Learn Ethical Hacking - Ethical Hacking tutorial - Open Terminal - Ethical Hacking examples - Ethical Hacking programs
Step 2:
- Type nmap wikitechy.com and hit enter.
Learn Ethical Hacking - Ethical Hacking tutorial - Command Nmap Wikitechy Site - Ethical Hacking examples - Ethical Hacking programs
Step 3:
- The output of network scanning(website).
Learn Ethical Hacking - Ethical Hacking tutorial - Displayed Open Ports - Ethical Hacking examples - Ethical Hacking programs
Step 4:
- Type nmap 162.144.36.172 and hit enter (wikitechy 162.144.36.172)
Learn Ethical Hacking - Ethical Hacking tutorial - Command For Fast Scanning - Ethical Hacking examples - Ethical Hacking programs
Step 5:
- Open ports and service are displayed.
Learn Ethical Hacking - Ethical Hacking tutorial - Output of Network Scanning Website - Ethical Hacking examples - Ethical Hacking programs
Step 6:
- Type nmap -v 162.144.36.172 and hit enter.
Learn Ethical Hacking - Ethical Hacking tutorial - Command Nmap v Ip Address - Ethical Hacking examples - Ethical Hacking programs
Read Also
Step 7:
- Detailed output is shown here.
Learn Ethical Hacking - Ethical Hacking tutorial - Detailed Output - Ethical Hacking examples - Ethical Hacking programs
Step 8:
- Type nmap -v 162.144.36.* (for whole subnet scanning) and hit enter.
Learn Ethical Hacking - Ethical Hacking tutorial - Command Nmap V-Ip Address - Ethical Hacking examples - Ethical Hacking programs
Step 9:
- Output for whole subnet scanning.
Learn Ethical Hacking - Ethical Hacking tutorial - Output of Whole Subnet Scanning - Ethical Hacking examples - Ethical Hacking programs
Step 10:
- Type nmap -A 162.144.36.172 (for information and traceroute) and hit enter.
Learn Ethical Hacking - Ethical Hacking tutorial - information-and-traceroute.png - Ethical Hacking examples - Ethical Hacking programs
Step 11:
- Information and traceroute Output is shown here
Learn Ethical Hacking - Ethical Hacking tutorial - output-of-information-and-traceroute.png - Ethical Hacking examples - Ethical Hacking programs
Step 12:
- Type nmap -F 162.144.36.172 (for Fast scanning) and hit enter
Learn Ethical Hacking - Ethical Hacking tutorial - fast-scanning - Ethical Hacking examples - Ethical Hacking programs
Step 13:
- Fast scan output is shown here
Learn Ethical Hacking - Ethical Hacking tutorial - Fast Scan Output - Ethical Hacking examples - Ethical Hacking programs
Step 14:
- Type nmap --iflist (for Host interfaces and Routers)
Learn Ethical Hacking - Ethical Hacking tutorial - Host Interfaces And Routers - Ethical Hacking examples - Ethical Hacking programs
Step 15:
- Host interfaces and Routers Output is shown here.
Learn Ethical Hacking - Ethical Hacking tutorial - Output For Host Interface and Routers - Ethical Hacking examples - Ethical Hacking programs
Step 16:
- Type nmap -p 21 162.144.36.172 (for Particular port scanning)
Learn Ethical Hacking - Ethical Hacking tutorial - Particular Port Scanning - Ethical Hacking examples - Ethical Hacking programs
Step 17:
- Output of particular port scanning.
Learn Ethical Hacking - Ethical Hacking tutorial - Output of Particular Port Scanning - Ethical Hacking examples - Ethical Hacking programs
Step 18:
- Type nmap -p 10-160 162.144.36.172 (for Particular Range port scanning)
Learn Ethical Hacking - Ethical Hacking tutorial - Output of Range Outputs - Ethical Hacking examples - Ethical Hacking programs
Step 19:
- Given Ranged ports are scanned and outputs are displayed.
Learn Ethical Hacking - Ethical Hacking tutorial - Displayed Open Ports - Ethical Hacking examples - Ethical Hacking programs
Step 20:
- Type nmap -sV 162.144.36.172 (for Host services version numbers) and hit enter
Learn Ethical Hacking - Ethical Hacking tutorial - Command for Fast Scanning - Ethical Hacking examples - Ethical Hacking programs
Step 21:
- Host services version numbers are Displayed.
Learn Ethical Hacking - Ethical Hacking tutorial - Host Service Numbers are Displayed - Ethical Hacking examples - Ethical Hacking programs
Step 22:
- Type nmap -vvv-A -T4 -sS21 162.144.36.172 -oXNmap.xml (for Complete scan and store output file in xml format) and hit enter
Learn Ethical Hacking - Ethical Hacking tutorial - Complete scan and store output file in xml format - Ethical Hacking examples - Ethical Hacking programs
Step 23:
- Complete scan Report is ready and the xml file is stored in Download folder.
Learn Ethical Hacking - Ethical Hacking tutorial - Complete Scan Report - Ethical Hacking examples - Ethical Hacking programs
Step 24:
- Open Download folder and see the Nmap.xml file shown here.
Learn Ethical Hacking - Ethical Hacking tutorial - Converted File Stored in Download Folder - Ethical Hacking examples - Ethical Hacking programs
Step 25:
- Now convert xml to html . Type xsltproc Nmap.xml –o Nmap.html
Learn Ethical Hacking - Ethical Hacking tutorial - Convert Xml to Html - Ethical Hacking examples - Ethical Hacking programs
Step 26:
- xml file is converted into html format shown here
Learn Ethical Hacking - Ethical Hacking tutorial - Xml File is Converted - Ethical Hacking examples - Ethical Hacking programs
Step 27:
- xml file is converted into html format and stored in Downloads folder shown here
Learn Ethical Hacking - Ethical Hacking tutorial - Converted File Stored in Download Folder - Ethical Hacking examples - Ethical Hacking programs
Step 28:
- Open the Nmap.html file through Browser
Learn Ethical Hacking - Ethical Hacking tutorial - Open Html File Through Browser - Ethical Hacking examples - Ethical Hacking programs
Step 29:
- Complete scan Report is Shown here
Learn Ethical Hacking - Ethical Hacking tutorial - Complete Scan Report Html File - Ethical Hacking examples - Ethical Hacking programs
Learn Ethical Hacking - Ethical Hacking tutorial - Nmap Scan Report - Ethical Hacking examples - Ethical Hacking programs
Step 30:
- If you want to learn about Ethical Hacking Course , you can refer the following links Ethical Hacking Training in Chennai , Ethical Hacking tutorial , Hacking Course , Ethical Hacking Training , Learn Ethical Hacking