3 Nmap

download 3 Nmap

of 6

Transcript of 3 Nmap

  • 7/23/2019 3 Nmap

    1/6

    Experiment no 2: Packet sniffer tools

    Aim of experiment : Download and install nmap. Use it with different options to scan open

    ports, perform OS fingerprinting, do a ping scan, tcp port scan, udp port scan, etc.

    Objective of experiment: Objective of this module to learn nmap installation & use this to scandifferent ports.

    Scope: Used for ip spoofing and port scanning.

    Technology: Networing

    Theory:

    Nmap !"Networ #apper"$ is a free and open source !license$ utilit% for networ discover% and

    securit% auditing. #an% s%stems and networ administrators also find it useful for tass such asnetwor inventor%, managing service upgrade schedules, and monitoring host or service uptime.

    Nmap uses raw ' pacets in novel wa%s to determine what hosts are available on the networ,

    what services !application name and version$ those hosts are offering, what operating s%stems

    !and OS versions$ the% are running, what t%pe of pacet filters(firewalls are in use, and do)ens of

    other characteristics. t was designed to rapidl% scan large networs, but wors fine against

    single hosts. Nmap runs on all major computer operating s%stems, and official binar% pacages

    are available for *inu+, indows, and #ac OS -. n addition to the classic commandline Nmap

    e+ecutable, the Nmap suite includes an advanced /U and results viewer !0enmap$, a fle+ible

    data transfer, redirection, and debugging tool !Ncat$, a utilit% for comparing scan results !Ndiff$,

    and a pacet generation and response anal%sis tool !Nping$.

    Nmap features include:

    1 2ost discover% 3 dentif%ing hosts on a networ. 4or e+ample, listing the hosts that

    respond to 56' and(or 6#' re7uests or have a particular port open.

    1 'ort scanning 3 8numerating the open ports on target hosts.

    1 9ersion detection 3 nterrogating networ services on remote devices to determine

    application name and version number.;