Remove term: Nmap vulnerability assessment scan Techniques For vulnerability Discovery Nmap vulnerability assessment scan Techniques For vulnerability
ethical hacking

Nmap vulnerability assessment scan Techniques For vulnerability Discovery

Nmap vulnerability assessment scan Techniques For vulnerability Discovery

 nmap vulnerability assessment scan Techniques  Hello all viewers I hope u all are fine .In this article I will tell u about N Map  what is N- map and how you can use N- map for vulnerability  Assessment    and also for scan network  .  N-map is the best tool for vulnerability assessment  and also for port scanning  here are the some topics we will cover in this article  nmap vulnerability assessment scan Techniques

nmap vulnerability assessment scan Techniques

Topics covered in this article

  1. 1:- what is nmap 
  2. 2:-  How to install nmap in windows and Linux 
  3. 3:- How to open and run vulnerability assessment 
  4. 4:- nmap commands

nmap vulnerability assessment scan Techniques

1:- what is nmap: – As you all know that nmap is one of the Best tools for scanning.  The one of the best power full features in nmap is the nmap script engine   . Nmap contains many scripts for scanning like DNS enumeration, OS fingerprinting   and nmap is also use for checking vulnerability.  This script is written in LUA language you can write your own script or you can modify the existing ones  [nmap vulnerability assessment scan Techniques]

Hack WiFi using android  phone 

2:- How to install nmap in windows and Linux:-   nmap is a open source software you don’t need to paid for this tool there are many paid tool in  market  but I  think nmap is better than the paid software . You can download nmap from the official github websites    . If you are using nmap in backtrack5 or kali Linux you don’t need to download this tool nmap is already pre- installed in backtrack5 or kali Linux   .  But if you are a window user than you need to download this tool you can visit nmap official websites to download this tool nmap official    . Run the exe file from the link  and install the software   agree the agreement then click next next button  here you will see choose the component by default Zen map GUI will be installed  that’s all .  [nmap vulnerability assessment scan Techniques]

Different types of network protocols 

3:- How to run and open nmap vulnerability scanner:-   guys if you are using a kali Linux or backtrack5   you can direct open nmap from the terminal by typing ‘nmap’  in window you can click the  software an open it .  [nmap vulnerability assessment scan Techniques]

Vulnerability -Assessment- Penetration- Testing

After opening nmap changes the directory to cd/usr/local/share/nmap/scripts/        this is the directory where the nmap scr4:-   Top nmap commands ipt is stored   you can update your nmap database by typing     nmap –script-updatedb   [nmap vulnerability assessment scan Techniques]

 

4:-   Top nmap commands

1:– how to scan a single IP:- nmap 192.168.0.0

 

2:– How to scan a host: –

 

nmapwww.example.com
3:- how to scan a range of IP nmap 192.168.0.0-20

 

4:- scan target from the text nmap –iL List-of-ips.txt
5 :- TCP connect scan

 

nmap –sT 192.168.0.0
6:-  udp scan nmap –Pn –F 192.168.0.0

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.