Nmap (Network Mapper) is an application or tool that was made by Gordon Lyon. Or better known as Fyodor Vaskovich. This application is used to audit existing network. By using this tool, we can see a host of active, open ports, operating systems used, and other feature-feature scanning. At first, Nmap can only run on the Linux operating system, but in its development today, virtually all operating systems can run Nmap.
Nmap is a tool that is already very famous, even used by the movie Matrix Reloaded are well known. At the end of the movie Trinity using nmap to break into computer systems that make an emergency electric power tool maker is proud of Fyodor. Yes Fyodor proud because the Matrix is the only Hollywood film that uses a method of breaking into the real thing. But this tool should not be used on someone else's system as illegal and unlawful.
In this tutorial, I will give some examples of the use of nmap that I run slackware linux distribution with command line course.
Perform port scanning on a host:
root@bufferdie:~# nmap -sS prima.net.id
Starting Nmap 4.76 ( http://nmap.org ) at 2009-06-12 19:03 WIT
Interesting ports on webhost.prima.net.id (202.57.0.19):
Not shown: 984 closed ports
PORT STATE SERVICE
1/tcp open tcpmux
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
53/tcp open domain
80/tcp open http
110/tcp open pop3
111/tcp open rpcbind
135/tcp filtered msrpc
143/tcp open imap
443/tcp open https
445/tcp filtered microsoft-ds
465/tcp open smtps
993/tcp open imaps
995/tcp open pop3s
3306/tcp open mysql
Nmap done: 1 IP address (1 host up) scanned in 9.09 seconds
Knowing the OS used on the target host:
root@bufferdie:~# nmap -O nusa.net.id
Starting Nmap 4.76 ( http://nmap.org ) at 2009-06-12 19:21 WIT
Interesting ports on asterix.mdn.nusa.net.id (202.162.192.230):
Not shown: 994 closed ports
PORT STATE SERVICE
80/tcp open http
135/tcp filtered msrpc
443/tcp open https
445/tcp filtered microsoft-ds
5222/tcp open unknown
5269/tcp open unknown
Device type: general purpose|firewall|router|WAP|specialized|printer
Running (JUST GUESSING) : Linux 2.4.X|2.6.X (91%), Secure Computing Linux 2.4.X (90%), Enterasys embedded (90%), MikroTik RouterOS 3.X (90%), Infoblox NIOS 4.X (90%), Lexmark embedded (89%), SonicWALL embedded (88%)
Aggressive OS guesses: Linux 2.4.22 (Fedora Core 1, x86) (91%), Linux 2.4.31 (Slackware 10.2) (91%), Linux 2.6.11 (Auditor) (91%), Linux 2.6.21 (91%), Linux 2.6.24 – 2.6.25 (91%), Secure Computing SnapGear SG560 firewall (Linux 2.4.31-uc0) (90%), Enterasys Matrix X router (90%), Linux 2.6.9 – 2.6.19 (90%), MikroTik RouterOS software router 3.0beta5 (90%), OpenWrt 7.09 (Linux 2.6.22) (90%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 7 hops
Using Fin Scan:
root@bufferdie:~# nmap -sF vip.net.id
Starting Nmap 4.76 ( http://nmap.org ) at 2009-06-12 19:40 WIT
All 1000 scanned ports on mail.vip.net.id (202.154.176.9) are closed (965) or open|filtered (35)
Nmap done: 1 IP address (1 host up) scanned in 10.87 seconds
Using SYN Stealth Scan:
root@bufferdie:~# nmap -PE main.telkomspeedy.com
Starting Nmap 4.76 ( http://nmap.org ) at 2009-06-12 19:45 WIT
Interesting ports on plasa2-acc.plasa.com (125.160.17.26):
Not shown: 997 closed ports
PORT STATE SERVICE
80/tcp open http
135/tcp filtered msrpc
445/tcp filtered microsoft-ds
Nmap done: 1 IP address (1 host up) scanned in 38.37 seconds
It was about some examples of how to use nmap, if you are not satisfied you can read in the manual nmap [dot] [org] ataw by using the command:
# Nmap Human
or if you want to see the options available in helping nmap you can call it with the command:
# Nmap-h
Category ›
Computers
No comments:
Post a Comment