Using Nmap, the network scanner


Nmap is an open source port scanner that allows the exploration network and get information about the operating system of a remote computer, this software is increasingly used by network administrators as the audit of the results of Nmap provides precise indications of a network. It is available on Linux, Windows and Mac OS.

In this article we will describe the basic operation of Nmap Backtrack Linux 5 and identify key points of your servers or machines to avoid Imprévu attacks.

Use:

Identify the operating system of a remote machine

  nmap -O 127.0.0.1
If nmap can not identify the version of your OS, you can view a list of systems that could potentially match:

  nmap -O---osscan guess 127.0.0.1

Detecting machines on a network

If you want to identify all existing machines on your network.

nmap 192.168.0.0/10 -sP
View open ports on a machine
A port scan allows you to see how your machine is seen from the outside, what are the services that are available. As against a port scan allows a hacker to see the services running away to find a flaw on one of these services and how it can go further in the attack.

  nmap 127.0.0.1
Scanner for a specific port. Here is the HTTP port:

  nmap -p 80


Spoof the MAC address

The MAC address spoofing is change a MAC address so that it resembles that of another network card. This technique is called "MAC Spoofing"

--spoof nmap-mac 01: 02: 03: 04: 05: 06 127.0.0.1
--spoof nmap-mac Cisco 127.0.0.1

View all open TCP ports

 nmap 127.0.0.1 -sS 80

View all UDP ports

 nmap 127.0.0.1 -sP 80

Scan ftp bounce

The FTP bounce scan (FTP Bounce) is ensured by the -b option, it can ask the FTP server to port scan for you. This technique is a little old but it is still possible to find vulnerable FTP servers.

In my case I go through my local ftp server that has the address 127.0.0.1 to scan an IP address range:

nmap -b 127.0.0.1 192.168.0, .0-255
The real utility of Nmap for hackers is in the combination of the latter with Metasploit Framework to scan one or more machines and automatically launch exploits. : D

That's why I encourage you to test Nmap on your network to verify that your machines have no exploitable flaw.

If you have other examples of uses, you can post a comment.

Remember that the best support for this blog is to love and share our articles!

For more news, thank you for subscribe to the blog newsletter to its RSS feed. Please also have a look at TwitterGoogle+ or Facebook for other news.
Previous
Next Post »