Nmap [open ports weakest security links]


                            Unwanted open ports are the weakest security link




Due to coronavirus most of the road lines are blocked. Just imagining if i can run Nmap to find what are the routes available for me to traverse it would be great well that is not possible. so let do the possible things with the Nmap tool.   




Nmap basics.

In my earlier post I have given you just snippets of the Nmap. Now let dig a out more info related to this tool because it is one of the important tool used for network discovery and security auditing. For people who like GUI then Zenmap is a good choice. I will be attaching the screenshot of the terminal it will be a quick guide for us.

Without delaying let’s start

Check for listening open ports
nmap www.target.com
This will scan the 1000 most popular port by using TCP method



Fingerprinting service of the remote host

Fingerprinting is use find the ser
 nmap  -sV www.targetwebsite.com

You can set the amount of probes to use it will change the intensity of scan. 





nmap  -sV  --version-intensity 9
This tool has special flag to activate aggressive detection namely –A aggressive mode enable os detection (-O) version detection (-sV) script scanning (-sC) and traceroute  yes it will give a lot fo information but the problem is the chance of getting detected increases it will casue the termination of further investigation.
nmap –A <Target>





nmap –sC  -sV –O <target>

To find live host in a network

nmap –sP 192.168.111.1/24





Nmap –sV –script vuln 192.168.111.3
This command will try to run every script against the target to check for vulnerabilities. I haven't attached the screenshot you can go and try yourself.
Follow the link  to know more commands




                            https://github.com/samitech10/Nmap/blob/master/Commands














Comments

Popular Posts