Nmap is a tool to scan and analyze a host, this is one of the most important steps for a hacker. Today we will see how to use it.
ALSO READ: 7 pentesting tool Ubuntu, how to install them
Let's start with a simple scan, then type
nmap --version-light www.google.com
this is the result:
as we can see from the photo, it has scanned the other hosts related to Google and its open ports, the latter are an important point for a hacker, but to proceed he also needs to know the system that the victim is using, for this it is use the -A option
quindi
nmap --version-light -A www.google.com
we can see the "Service Scan", the OS that Google uses is Linux (linux_kernel), now let's see how to do an in-depth (almost) maximum scan, we're going to scan all the TCP / UDP ports, the services and what we've seen so far, I state that we can wait even longer than 5 minutes (even if on Google servers I don't think it has much effect, but it's a demonstration)
the command to write is:
nmap --version-all -p 1-65535 -A www.google.com
Here's how an nmap command is structured (you need an average knowledge of the Linux terminal)
nmap
Available Options:
nmap <[options :-p -T4 --version-light -A -O --version-all (these are just the main ones, type --help to see them all) (of course you can use multiple options at once)]> < [target: www.sito.it/ XXX.XXX.XX.X]>
the result will be
nmap --versionò-light -A www.sito.it
Guide for information purposes, penetrating / attaching a computer system (Desktop PC, Laptop, Mainframe, smartphone) is punishable by law, if not granted by the owner!