Nmap is most widely used port scanning & network mapping tool used widely by network administrators & security administrators to scan their ports for potential vulnerabilities. If you are not aware of Nmap & you don’t have it then you can download it here for both Linux & Windows.
1. Open Closed
2. Filtered Unfiltered
3 .Open / filtered Closed/unfiltered
Scanning through Nmap gives you list of ports that are opened or filtered. Most of closed ports are not disclosed as there are almost 65000 ports in a computer for communication.
(Filtered packet : It means the data packets that are sent or received are filtered by firewall to secure it.)
Ok, So ready to hack with Nmap,
There are three types of basic scans you can perform on ports which is as follows :
SYN Scan : It is the most simple & common scan that is used to scan for ports. The scan results are very faster compared to other types , but it gives generalized results.
FIN Scan : FIN scan can detect if any kind of filtered packets or weak firewalls, and warns attacker to create stealth for attacking the victim network.
ACK Scan : Filtered and unfiltered ports can be scanned with this type of port scan. It is the most advanced scanning done with nmap.
SYN scan :
For scanning www.sampledomain.com
Type in your terminal of linux:
#nmap -sS -T4 www.sampledomain.com (replace domain or IP you wish to scan at sampledomain.com)
Result will be having three tables :
Port State Service
This will give you port number its state open?filtered like that & services will give you what is service running on that ports.
FIN Scan :
#nmap -sF -T4 www.sampledomain.com (replace domain or IP you wish to scan at sampledomain.com)
Live host & filtered ports are found out with this method
ACK Scan :
#nmap -sA -T4 www.sampledomain.com (replace domain or IP you wish to scan at sampledomain.com)
All closed ports are eliminated with this ACK scan. And you’ll only see ports that are up for attack.
So this was a basic Nmap hacking or port scanning tutorial. You can also find OS running, web server & mail server scanning & this data can be used as Passive attack gathering stage which we have discussed in pre attack stages.
Nmap Hacking Theory
Following are the states that ports are available in1. Open Closed
2. Filtered Unfiltered
3 .Open / filtered Closed/unfiltered
Scanning through Nmap gives you list of ports that are opened or filtered. Most of closed ports are not disclosed as there are almost 65000 ports in a computer for communication.
(Filtered packet : It means the data packets that are sent or received are filtered by firewall to secure it.)
Ok, So ready to hack with Nmap,
There are three types of basic scans you can perform on ports which is as follows :
SYN Scan : It is the most simple & common scan that is used to scan for ports. The scan results are very faster compared to other types , but it gives generalized results.
FIN Scan : FIN scan can detect if any kind of filtered packets or weak firewalls, and warns attacker to create stealth for attacking the victim network.
ACK Scan : Filtered and unfiltered ports can be scanned with this type of port scan. It is the most advanced scanning done with nmap.
Hacking With Nmap
So let us start with commands of Nmap operation in Linux:SYN scan :
For scanning www.sampledomain.com
Type in your terminal of linux:
#nmap -sS -T4 www.sampledomain.com (replace domain or IP you wish to scan at sampledomain.com)
Result will be having three tables :
Port State Service
This will give you port number its state open?filtered like that & services will give you what is service running on that ports.
FIN Scan :
#nmap -sF -T4 www.sampledomain.com (replace domain or IP you wish to scan at sampledomain.com)
Live host & filtered ports are found out with this method
ACK Scan :
#nmap -sA -T4 www.sampledomain.com (replace domain or IP you wish to scan at sampledomain.com)
All closed ports are eliminated with this ACK scan. And you’ll only see ports that are up for attack.
So this was a basic Nmap hacking or port scanning tutorial. You can also find OS running, web server & mail server scanning & this data can be used as Passive attack gathering stage which we have discussed in pre attack stages.
3 comments:
Hey just wanted to give you a quick heads up. The text in your article seem to be running off the screen in Ie.
I'm not sure if this is a format issue or something to do with internet browser compatibility but I thought I'd post to let you know.
The layout look great though! Hope you get the problem fixed soon. Kudos
My weblog thumbshots.link-commander.com
During a private 45-minute presentation xbox showcasing the console's new
dashboard will now hae numerous those hat decide to must in essence, observe to receive a key component to Microsoft's deciwion to drop prices.
Also visit mmy site :: free xbox live codes
Hello everyone I want to introduce you guys to a group a private investigators who can help you with information you need in any situation in life and they are ready to follow you step by step until your case is cleared just contact +17078685071 and you will happily ever after
Premiumhackservices@gmail.com
Post a Comment