Hacking, computer security: use of the "nmap" tool

Nmap is a tool to scan and analyze a host, this is one of the most important steps for a hacker. Today we will see how to use it.

ALSO READ: 7 pentesting tool Ubuntu, how to install them

Let's start with a simple scan, then type

nmap --version-light www.google.com

this is the result:


as we can see from the photo, it has scanned the other hosts related to Google and its open ports, the latter are an important point for a hacker, but to proceed he also needs to know the system that the victim is using, for this it is use the -A option


nmap --version-light -A www.google.com


we can see the "Service Scan", the OS that Google uses is Linux (linux_kernel), now let's see how to do an in-depth (almost) maximum scan, we're going to scan all the TCP / UDP ports, the services and what we've seen so far, I state that we can wait even longer than 5 minutes (even if on Google servers I don't think it has much effect, but it's a demonstration)

the command to write is:

nmap --version-all -p 1-65535 -A www.google.com

Here's how an nmap command is structured (you need an average knowledge of the Linux terminal)

nmap <options> <target>

Available Options:

nmap <[options :-p -T4 --version-light -A -O --version-all (these are only the main ones, type --help to display them all) (obviously you can use multiple options simultaneously)]> < [target: www.sito.it/XXX.XXX.XX.X]>

the result will be

nmap --versionò-light -A www.sito.it

Guide for information purposes, penetrating / attaching a computer system (Desktop PC, Laptop, Mainframe, smartphone) is punishable by law, if not granted by the owner!

Receive the latest posts by email

Enter the email and choose the inscriptions on the new page