Introduction of NMAP Network Mapper

Introduction to NSA

Advance Network Scanning
Introduction to Metasploit Framework
Search and Add Exploit
————————————–

NSA –> Network Security Analysis

5 phases of hacking in NMAP

1. Information Gathering
2. Scanning
3. Gaining Access
4. Maintaining Access
5. Covering Traces

Information Gathering

1. Target Specific
2. Network Specific

Network Specific Information Gathering
======================================
IP Address
Socets
Ports
MAC Address
…..
…..

1. Normal Information Gathering
2. Advanced | Intelligent Information Gathering

1. Normal Information Gathering
——————————-
Number of Devices Connected
IP Address Allocated
MAC Address
Vendor Name

Tools for scanning

arp-scan
#arp-scan –local
netdiscover
#netdiscover -r 192.168.0.1/24 -i wlan0

2. Advanced | Intelligent Information Gathering

In this type of information gathering, we will get very minute and granular information about the target in the network.
IP Address
MAC Address
Ports
Services
Version
Vendor
Operating System
Operating System Version
Operating System Family
Protocol

Tools
=====
nmap
zenmap

NMAP –> Network Mapper
=======================
Network exporation and discovery tool, which helps us in gathering the informartion about a network and a target website too. It was designed to scan the large networks but it also works perfectly fine for smaller networks.
It is CLI (command line interface) based tool

Types of Scan
=============

1. Network Specific Scan
#nmap 192.168.0.1-255
#nmap 192.168.0.1/24

STATE –> 1. OPEN
2. CLOSED
3. FILTERED
FILTERED|OPEN
FILTERED|CLOSED

2. Target Specific scan
#nmap <IP Address Of The Target>

3. Agressive Scan
#nmap -A -T4 <IP Address Of The Target>
A –> Agressive Scan
T –> Time Duration between sending 2 consecutive packet
4 –> 4 unit of time(sec)

4. Service Detection Scan
#nmap -sS 192.168.0.189
s –> Script
S –> Service Detection

5. Version Detection Scan
#nmap -sV <IP Address>

6. Minute Details
#nmap -sC <IP Address>

7. Combined Scan
#nmap -sS -sC -sV <IP Address>

8. Port Specific Scan
#nmap 192.168.0.181 -p80,3306
#nmap 192.168.0.181 -p80-3306

9. Firewall Scan
#nmap -f <IP Address>
#nmap <IP Address> -Pn
#nmap <IP Address> -Pn -p80,3306
#nmap –script firewall-bypass <target>

10. Vulnerability Scan
#nmap –script vuln 192.168.0.101

11. Operating System Detection Scan
#nmap 192.168.0.101 -O

12. To scan a website
#nmap <website domain name>

ZENMAP —> Twin Brother of NMAP, but it is GUI Based.

Flags
=====
1. ACK –> Acknowledgement
2. SYN –> Synchronization
3. FIN –> Finish
4. RST –> Reset
5. PSH –> Push
6. URG –> Urgent



Follow Us On Cyber Point Solution Youtube Channel : Click Here

Follow Us on Social Platforms to get Updated : twiter,  facebookGoogle Plus

Learn More Ethical Hacking and Cyber Security click on this link. cyber security

Leave a Reply

Your email address will not be published. Required fields are marked *