Is this tool helful in finding the vulnerability or is it just for scanning purpose?
how to attck using nmap? On Jun 1, 8:59 pm, Ravi Gopal <[email protected]> wrote: > #1:*For beginners to start with here is the basics of nmap*: > > =========================== > Syntax: nmap <Type of Scan> <options> Target > =========================== > > *<Scan types>* > *Types of Scan** **Option* > SYN scan -sS > UDP scan -sU > TCP Scan -sT > ACK scan -sA > FIN scan -sF > Null scan -sN > XMas Scan -sX > > *Note:* FIN,NULL and XMas scans are called as stealth scans. > There are other types of scans also like icmp Echo, ping scan, Idle scan > etc. Please refer to NMAP documentation/help for more types. > > *<Options>* > -p<port range> --> port range can be single port or multiple ports separated > by commas or range of ports (EX: -p23 OR > -p23,25,110,3389 OR -p1-65535) > -sV Version --> displays the version of the service running (Ex: IIS > 6.0)' > -O Operating System --> OS fingerprinting > -T(0-5) Timing option --> ideally -T4 is preferable for faster scan with > optimum performance > -PN host discovery skip --> This option is very useful when you are sure > that target is up/alive > > *Target:* > Target can be either IP address or netmask or Website > > Here are few Exaples: > > *nmap -sS -O -p1-65535 192.168.0.34* > *nmap -sS -sV -p23,80-110,3389 192.168.0.34* > *nmap -sS -sV -p23 192.168.0-5.1-254* > > *<< My Observations:* > *Nmap scan on Linux operating system is faster than the scan on windows > operating systems >>* > > Regards, > Ravi Gopal > > > > On Tue, Jun 1, 2010 at 2:37 AM, Sandeep Thakur <[email protected]> wrote: > > Thanks Naik for passing us the nmap cheatsheet. Pls find the below > > link which is interesting and can give you little depths of how nmap > > works or process the commands... > > >http://haymanezzeldin.blogspot.com/2008/03/nmap-detection-and-counter... > > > Regards > > Sandeep Thakur > > > On May 31, 10:56 am, Srinivas Naik <[email protected]> wrote: > > > Hey, > > > > Further Scans is disclosed in this attached CheatSheet. > > > > Regards, > > > Srinivas Naik > > > > On Sun, May 30, 2010 at 10:42 PM, N41K <[email protected]> wrote: > > > > Hi, > > > > > Shall we have discussion on NMAP, as there are many Network Security > > > > Experts in our community. > > > > > Lets list out what all can be discussed . > > > > > Policy compliance scan > > > > # nmap -vv –PA80 –PE –PS23 –sS –iL input.lst --excludefile banned.lst > > > > -A --osscan_limit –F –R -oA policy_check > > > > > Firewall Audit > > > > # nmap -vv –P0 –sA –iL input.lst --excludefile banned.lst –r -n -oA > > > > firewall > > > > > Regards, > > > > 0xN41K > > > > Nmap5_cheatsheet.pdf > > > 497KViewDownload > > > -- > > You received this message because you are subscribed to the Google Groups > > "nforceit" group. > > To post to this group, send an email to [email protected]. > > To unsubscribe from this group, send email to > > [email protected]<nforceit%[email protected]om> > > . > > For more options, visit this group at > >http://groups.google.com/group/nforceit?hl=en-GB.- Hide quoted text - > > - Show quoted text - -- You received this message because you are subscribed to the Google Groups "nforceit" group. To post to this group, send an email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/nforceit?hl=en-GB.
