Information Gathering with NMAP

Welcome to my third tutorial on Information Gathering

In this tutorial we ll be use NMAP to gather Open Ports information about our target.

So first let us start with some basics of NMAP.

Using NMAP you can check the open ports and services versions running on a server that may help you to get direct access exploiting any of the functionality or via bruteforcing. It also helps you to understand about the services running on the server so that later it may help you while pentesting.

The two basic scan types used most in Nmap are TCP connect() scanning [-sT] and SYN scanning (also known as half-open, or stealth scanning) [-sS].

For a basic port scan:


Nmap


For a Stealth port scan:
Nmap -sS

To scan the service version running on Open Ports use -sV switch
Nmap -sV

Some times if a server is blocking your ping and acting dead then you can use -Pn switch to scan it
Nmap -sV -Pn

For a OS detection you can use -O switch

Nmap -O -Pn

Thats all for this tutorial see you in the next tutorial, keep rocking, and keep hacking.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s