Nmap 2

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Nmap 2.

0: Performing Basic Network Scans


Adding Configuration Options
To do more advanced types of scans, we’ll need to include configuration options in our
commands Configuration options in our commands. Configuration options, in short, are a set of
parameters that can be added to a Nmap command to specify to Nmap what we want. The
general format of these commands will be:
nmap [options] [target]
An aggressive scan be made by adding -a configuration option to our command. This means,
instead of using the format:
An Aggressive scan uses the -A configuration option. If you are doing an aggressive scan on the
localhost by using the following command
nmap -A localhost
If you want less information, look at a specific port. There is a service running that hasn’t shown
up in our other scabs. Let’s use the -p option to scan port 8025. The format for this type of
command is
nmap -p[port#] [target]
To use port 8025 on the target localhost, we will use the command
nmap -p8025 localhost

Network Discovery
When we scan a system, it’s different from “pinging” the target(s) of interest. Specific
protocols will need to be checked for availability to identify services available.
TCP vs UDP
Transmission Control Protocol (TCP) is the primary protocol used in most computer
communications. TCP is a connection-oriented protocol, where a more rigorous
acknowledgement between one sender and one receiver must happen any data can control and
error recovery, and it is used when larger amounts of data need to be sent and timing is less of a
concern.
User Datagram Protocol (UDP) is a more

You might also like