Question

In: Computer Science

Overview about nmap and a working demo of nmap

Overview about nmap and a working demo of nmap

Solutions

Expert Solution

Please note: The information provided below is only for educational purposes. Hacking is illegal, crime, unofficial, informal, and is against law. Any hacking activities to be carried out on a system, computer, device, mobile device, server, network, website, etc. must require written authorization of the owner of the system, computer, network, server, etc., providing his/her permission to do so for a genuine reason, in a written statement with his/her authorization clearly defined and stated in it. However, using the Nmap tool is legal if and only if it is used properly. Using it for port scanning on external servers could be illegal.

NMap is the acronym for Network Mapper. Nmap is a network scanning tool. It is an open-source and free software or utility. The tool is used for discovering services and hosts on a computer network sending packet requests and analyzing the received responses. It is used to probe computer networks and detect or discover hosts, networks, services, and Operating System (OS). Nmap tool is used to protect one's network from attackers, hackers, or bad actors. It is used in Penetration Testing (Pen-Test) activities as part of security auditing for quickly detecting any security vulnerabilities in one's systems. It is mostly used to scan ports on a server to see what ports are opened (listening) and closed, so unnecessary ports can be closed for security purposes on the server.

The syntax of the command is as shown below:
nmap <IP address of the server>

You could scan on your own server on your network. It could be the private IP address of your own server.
You could also type in your own website address i.e.,
nmap <website address>

As an example:

nmap www.example.com

It would list the port number, the type of protocol of the port if TCP or UDP, the state of the port number of open or closed, and the service running on that port number. The output would also display the time in seconds to scan the server for all the ports and when the command started to scan the server, displaying the date, time, and time zone. It will also display if the host is up and running or is down. It will display the latency in seconds. It will display the total number of filtered ports that are not shown for security reasons. Filtered ports mean there is a firewall placed in front of the server.

The example below is the command run on google's public DNS server. 8.8.8.8 is its IP address.

nmap 8.8.8.8

The output will probably show details about only one port i.e., port number 53, which is the port number for the DNS service, with TCP protocol, and the state being opened. You would probably see about 999 filtered ports that are not shown, for security reasons.


Related Solutions

Nmap Focus on an overview of the topic - what is the problem? Primary security focus...
Nmap Focus on an overview of the topic - what is the problem? Primary security focus area and how - authentication, access control, vulnerability analyzer, security architecture, penetration testing, etc. Why is your tool relevant in the current class? Design of experiments (attack/defense/protection/response/encryption).Basic proof of concept with preliminary tests. • Technical content including implementation information such as platform, language and tools to be used. • Outline for final working model (preferably demo). Include 1-2 design diagrams explaining your working prototype.
22.34 Lab 12 B FALL 2019 Python File I/O demo Overview This is a demonstration of...
22.34 Lab 12 B FALL 2019 Python File I/O demo Overview This is a demonstration of File IO Description Read in a list of states from a file, and output those states in alphabetical order. Provided input files A single input file named states.txt is provided that lists the 50 states of the United States - one state per row. Some states have lowercase letters, where some begin with uppercase letters. As a reminder, lowercase letters come after uppercase letters...
1.what history of Nmap? 2.what is the advantage and disadvantage of using Nmap? plz post also...
1.what history of Nmap? 2.what is the advantage and disadvantage of using Nmap? plz post also the References for your answers
1.The recorded session, provides a good overview on working this problem. Use the "A Number of...
1.The recorded session, provides a good overview on working this problem. Use the "A Number of Useful Financial Spreadsheets" to find a sample template you can use to work this problem. I went over this in the recorded session. The problem you will answer has the following fact pattern: A couple has just given birth to a baby and named him Jimmy. They want to set up a college savings account for Jimmy and start saving for his college education....
Give a overview on nayirah false flag testimony about Kuwait
Give a overview on nayirah false flag testimony about Kuwait
1. Generate a nmap command with the following options: - Polite Scan - Store the results...
1. Generate a nmap command with the following options: - Polite Scan - Store the results in a grep-able format (use the name: targets) - The 25 top ports - Do not ping the scanned targets - Target network: 192.168.10.0/24 2. The tool which allows you to script up nmap scans such as vulnerability scans, network discovery, exploitation, etc. is called the ____ ____ ____ (NSE).
Q:- write overview about expenditure cycle. Support your answer with DFD?
Q:- write overview about expenditure cycle. Support your answer with DFD?
I want introduction to talk about the overview of the system of washing clothes, it just...
I want introduction to talk about the overview of the system of washing clothes, it just small program not big project yes it is program language but I just want the requirement of this system, contain an introduction and use case
By searching the Internet, answer these two questions About Exxon Mobile Petroleum : An overview of...
By searching the Internet, answer these two questions About Exxon Mobile Petroleum : An overview of the company's quality policies, plans and supply chain policies.>? What procedures the company follows to ensure efficient operations.>?
Can you fix the errors in this code? package demo; /** * * */ import java.util.Scanner;...
Can you fix the errors in this code? package demo; /** * * */ import java.util.Scanner; public class Booolean0p {        public class BooleanOp {            public static void main(String[] args) {                int a = 0, b = 0 , c = 0;                Scanner kbd = new Scanner(System.in);                System.out.print("Input the first number: ");                a = kbd.nextInt();                System.out.print("Input...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT