Nmap: Difference between revisions

From Hackepedia
Jump to navigationJump to search
New page: If you don't find an option in your version of nmap, you might want to upgrade to the latest version. We were using nmap 4.20 for the purposes of this page. You may wish to spoof your [[M...
 
m Christmas Tree Scan, Merry Xmas and Happy New Year!
 
(One intermediate revision by one other user not shown)
Line 1: Line 1:
If you don't find an option in your version of nmap, you might want to upgrade to the latest version. We were using nmap 4.20 for the purposes of this page.
The network mapper, or nmap, is used to scan [[Ports]] on a given host. It is assumed you have nmap in your [[$PATH]] in our examples.
If you don't find an option in your version of nmap, you might want to upgrade to the latest version. We were using nmap 4.20 while writing this page.


You may wish to spoof your [[MAC]] address. You can specify 0 for random, or the name of a vendor such as "Cisco", or the actual MAC address you want to impersonate:
You may wish to spoof your [[MAC]] address. You can specify 0 for random, or the name of a vendor such as "Cisco", or the actual MAC address you want to impersonate:
  --spoof-mac Cisco
  $ nmap --spoof-mac Cisco


If you want nmap to try to determine the remote operating system:
$ nmap -O [[Variables|$host]]
To do a Christmas Tree scan you'd type
   
   
 
# nmap -sX [[Variables|$host]]





Latest revision as of 05:12, 24 December 2008

The network mapper, or nmap, is used to scan Ports on a given host. It is assumed you have nmap in your $PATH in our examples. If you don't find an option in your version of nmap, you might want to upgrade to the latest version. We were using nmap 4.20 while writing this page.

You may wish to spoof your MAC address. You can specify 0 for random, or the name of a vendor such as "Cisco", or the actual MAC address you want to impersonate:

$ nmap --spoof-mac Cisco

If you want nmap to try to determine the remote operating system:

$ nmap -O $host

To do a Christmas Tree scan you'd type

# nmap -sX $host






Official nmap website

self port scan