How to Run Network Scanning with Nmap
Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.
In this article, we’ll do network scan with Nmap. By default, it is available on Kali Linux and Parrot OS. If you need to install it manually you can follow this article.
Table of Contents
- Run Simple Scan
- Perform a Fast Scan
- Scan a Specific Port
- Scan Top Ports
- Find Open Ports
- Detect OS
- Aggressive OS Detection
- Save Results
Run Simple Scan
Let’s run a simple scan:
nmap scanme.nmap.orgPerform a Fast Scan
Using parameter -F, we can perform a fast scan:
nmap -F scanme.nmap.orgScan a Specific Port
To run a specific port scan parameter -p is used.
nmap -p 80 scanme.nmap.orgScan Top Ports
Using parameter –top-ports we can scan many top ports at once:
nmap --top-ports 5 scanme.nmap.orgFind Open Ports
Just use –open parameter to show find open ports:
nmap --open scanme.nmap.orgDetect OS
Detect server’s operating system (OS):
nmap -O scanme.nmap.orgAggressive OS Detection
Run this command to get aggressive OS detection results:
nmap -sV --version-intensity 5 scanme.nmap.orgSave Results
To save a scan output in a text file, use -oN parameter:
nmap -oN results.txt scanme.nmap.orgThat’s it. Thanks for reading.
Md Obydullah
Software Engineer | Ethical Hacker & Cybersecurity...
Md Obydullah is a software engineer and full stack developer specialist at Laravel, Django, Vue.js, Node.js, Android, Linux Server, and Ethichal Hacking.