🌐Network Scanning

In cybersecurity, network scanning refers to the process of exploring a computer network with the aim of identifying devices, services, operating systems, and security configurations. This scanning allows security professionals to assess the network infrastructure for potential vulnerabilities and weaknesses that could be exploited by attackers. Network scanning may involve searching for open ports, identifying active hosts, detecting running services, and gathering information that helps understand the network's topology and security.

NMAP

What is NMAP?

Nmap is a powerful open-source tool used for network exploration and security auditing. It helps discover devices on a network, identify open ports, and determine services and their versions. Nmap is widely utilized for vulnerability assessment, security audits, and penetration testing.

Scan hosts on a specific network:

nmap  192.168.1.0/24

Port scanning and service discovery:

nmap   192.168.1.150

Scan ports in a specific range:

nmap -p  192.168.1.150

Scan specific ports:

nmap -p 22,53,80,443 192.168.1.150

Save a scan in plain text:

nmap 192.168.1.150  

More options:

  • -v: Is used to activate the "verbose" or detailed mode during scanning. (Options: -v to -vvv)

  • --min-rate 4500: Is used to set the minimum rate at which packets are sent during the scan.

  • -sS: Specifies the use of TCP SYN (synchronize) scan. This type of scan is one of the most common and stealthy scanning techniques.

  • -n: Is used to skip DNS resolution during the scanning process.

  • -Pn: Is used to skip the host discovery phase during scanning.

  • -O: Is used to enable OS detection.

  • -sC: Is used to enable default script scanning. These scripts are designed to identify potential vulnerabilities, security issues, or provide additional information about the target.

Example of a scan with NMAP:

nmap -sCV -p 22,80 --min-rate 4500 -n -Pn 192.168.1.150 -oN target
  • -sCV = -sC + -sV

Last updated