paxnWo Posted November 27, 2008 Report Posted November 27, 2008 ---------------------------------------------------------------------------------------[+] Nmap Basics - Tutorial[+] Author: Neutralise---------------------------------------------------------------------------------------Intro:The tool i will be teaching you to use is called nmap and you can find the site for nmap and further documentation here:http://insecure.org/nmap/Nmap is the leading security scanner for network professionals.For starters open up nmap, do this by double clicking the nmap shortcut button.It is important to remember that nmap is a commandline tool, not a simple clickand scan tool like other port scanners.Typing "nmap -help" will provide you with a FULL list of nmap's commands but since youwant to use it particularly for port scanning and finding what ports are open andwhat runs on them i will only explian the relevant commands. As to explain them all would take literally hours.---------------------------------------------------------------------------------------Firstly, to explain what it is we are doing. Ports are numbers that TCP/IP uses to map packets to services. For example some common ports are:21 FTP22 SSH23 TELNET25 SMTP80 HTTP110 POP3Full ports list can be viewed here:http://www.iss.net/security_center/advice/Exploits/Ports/---------------------------------------------------------------------------------------When scanning hosts there are a lot of options you may want to use to find more information about the target. Here are the most commonly used options:-sS TCP SYN scan-sT TCP connect scan-sU UDP port scans-v Verbose output-vv very verbose output-O Detect operating system-sV Service version detection-P0 Dont ping, just scan-p Choose your ports-F Fast scanFor example by scanning:nmap -vv -P0 192.168.0.3Would scan the IP 192.168.0.3, print very verbose output, and to scan the machine without pinging it.nmap -O 192.168.0.3This would do an OS version detection on the target host(TCP/IP finger-prinitng).nmap -p 1234 -O -sV 192.168.0.3This scan would scan port 1234 and see if it was open, as well as an OS version detection.---------------------------------------------------------------------------------------You can also make nmap save log files when outputing commands. These options are:-oN This logs to a normal file like you see on nmap (human readable).-oX XML output (open with webbrowser)(i use this one).For example by scanning:nmap -oX mylog.xml 192.168.0.3Would scan the host, then in the nmap program file folder save a file named mylog.xml, with the results of the scan in it.---------------------------------------------------------------------------------------Nmap has some commands to decoy where your scan is coming from.For example:-D Add decoy IPs to confuse the target's logsWhen the decoy option is used nmap will send spoofed packets from the IP address that you specify. This will confuse targets logs as it will look like many different machines are actually doing a port scan and it will make it hard for the administrator to decipher which IP is actually doing the portscan (yours).For example:nmap -P0 -D microsoft.com,ME,google.com 192.168.0.3This command wont ping, uses decoys of microsoft.com and google.com and ME is yourreal IP address (required).---------------------------------------------------------------------------------------[+]^Neutralised.--------------------------------------------------------------------------------------- Quote
a13x4nd7u Posted November 27, 2008 Report Posted November 27, 2008 Pentru linux exista nmapfe (Nmap Front End) care apare in fereastra, iar pentru Windows zenmap, care este tot in fereastra (adica merge si fara consola).Are si mai multe tipuri de scanari stealth. Quote