How to Run Network Scanning with Nmap
Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.
In this article, we’ll do network scan with Nmap. By default, it is available on Kali Linux and Parrot OS. If you need to install it manually you can follow this article.
Table of Contents
- Run Simple Scan
- Perform a Fast Scan
- Scan a Specific Port
- Scan Top Ports
- Find Open Ports
- Detect OS
- Aggressive OS Detection
- Save Results
Run Simple Scan
Let’s run a simple scan:
nmap scanme.nmap.org
Perform a Fast Scan
Using parameter -F, we can perform a fast scan:
nmap -F scanme.nmap.org
Scan a Specific Port
To run a specific port scan parameter -p is used.
nmap -p 80 scanme.nmap.org
Scan Top Ports
Using parameter –top-ports we can scan many top ports at once:
nmap --top-ports 5 scanme.nmap.org
Find Open Ports
Just use –open parameter to show find open ports:
nmap --open scanme.nmap.org
Detect OS
Detect server’s operating system (OS):
nmap -O scanme.nmap.org
Aggressive OS Detection
Run this command to get aggressive OS detection results:
nmap -sV --version-intensity 5 scanme.nmap.org
Save Results
To save a scan output in a text file, use -oN parameter:
nmap -oN results.txt scanme.nmap.org
That’s it. Thanks for reading.
Md Obydullah
Software Engineer | Ethical Hacker & Cybersecurity...
Md Obydullah is a software engineer and full stack developer specialist at Laravel, Django, Vue.js, Node.js, Android, Linux Server, and Ethichal Hacking.