Nmap: Difference between revisions

From Hackepedia
Jump to navigationJump to search
New page: If you don't find an option in your version of nmap, you might want to upgrade to the latest version. We were using nmap 4.20 for the purposes of this page. You may wish to spoof your [[M...
 
No edit summary
Line 1: Line 1:
If you don't find an option in your version of nmap, you might want to upgrade to the latest version. We were using nmap 4.20 for the purposes of this page.
The network mapper, or nmap, is used to scan [[Ports]] on a given host. It is assumed you have nmap in your [[$PATH]] in our examples.
If you don't find an option in your version of nmap, you might want to upgrade to the latest version. We were using nmap 4.20 while writing this page.


You may wish to spoof your [[MAC]] address. You can specify 0 for random, or the name of a vendor such as "Cisco", or the actual MAC address you want to impersonate:
You may wish to spoof your [[MAC]] address. You can specify 0 for random, or the name of a vendor such as "Cisco", or the actual MAC address you want to impersonate:
  --spoof-mac Cisco
  $ nmap --spoof-mac Cisco
 
If you want nmap to try to determine the remote operating system:
 
$ nmap -O [[Variables|$host]]


   
   

Revision as of 14:02, 17 July 2007

The network mapper, or nmap, is used to scan Ports on a given host. It is assumed you have nmap in your $PATH in our examples. If you don't find an option in your version of nmap, you might want to upgrade to the latest version. We were using nmap 4.20 while writing this page.

You may wish to spoof your MAC address. You can specify 0 for random, or the name of a vendor such as "Cisco", or the actual MAC address you want to impersonate:

$ nmap --spoof-mac Cisco

If you want nmap to try to determine the remote operating system:

$ nmap -O $host








Official nmap website

self port scan