3 Nmap
Transcript of 3 Nmap
-
7/23/2019 3 Nmap
1/6
Experiment no 2: Packet sniffer tools
Aim of experiment : Download and install nmap. Use it with different options to scan open
ports, perform OS fingerprinting, do a ping scan, tcp port scan, udp port scan, etc.
Objective of experiment: Objective of this module to learn nmap installation & use this to scandifferent ports.
Scope: Used for ip spoofing and port scanning.
Technology: Networing
Theory:
Nmap !"Networ #apper"$ is a free and open source !license$ utilit% for networ discover% and
securit% auditing. #an% s%stems and networ administrators also find it useful for tass such asnetwor inventor%, managing service upgrade schedules, and monitoring host or service uptime.
Nmap uses raw ' pacets in novel wa%s to determine what hosts are available on the networ,
what services !application name and version$ those hosts are offering, what operating s%stems
!and OS versions$ the% are running, what t%pe of pacet filters(firewalls are in use, and do)ens of
other characteristics. t was designed to rapidl% scan large networs, but wors fine against
single hosts. Nmap runs on all major computer operating s%stems, and official binar% pacages
are available for *inu+, indows, and #ac OS -. n addition to the classic commandline Nmap
e+ecutable, the Nmap suite includes an advanced /U and results viewer !0enmap$, a fle+ible
data transfer, redirection, and debugging tool !Ncat$, a utilit% for comparing scan results !Ndiff$,
and a pacet generation and response anal%sis tool !Nping$.
Nmap features include:
1 2ost discover% 3 dentif%ing hosts on a networ. 4or e+ample, listing the hosts that
respond to 56' and(or 6#' re7uests or have a particular port open.
1 'ort scanning 3 8numerating the open ports on target hosts.
1 9ersion detection 3 nterrogating networ services on remote devices to determine
application name and version number.;