Beruflich Dokumente
Kultur Dokumente
Getting Started
Start Nmap in a terminal window by simply typing nmap and you'll see a long list of
options as in figure 1.
Once you've got the hang of the basics it's worth experimenting with some of these,
but to get started with a very quick indication of the machines on your network, type
nmap sP 192.168.1.*.
The sP option makes Nmap perform a ping scan on all the IP addresses in the
specified IP range (in this case 192.168.1.1-255), listing the hosts which respond, as
in figure 2.
By default Nmap actually performs a ping scan before doing any other type of scan to
establish which IP addresses are actually in use, ignoring any addresses which don't
reply to the ping. This means that if any remote hosts or anything between you and
the remote hosts blocks these pings then Nmap will not be aware that they exist, and
won't attempt to interrogate them further. Fortunately you can get around this by
using the p0 option, which forces Nmap to scan any addresses you specify,
regardless of whether they respond to a ping.
If you know you have a host on your network at
192.168.1.150 that is not responding to a ping, you
can still investigate it using nmap P0
192.168.1.150. (See figure 3) By default Nmap
only scans a subset of all the available ports, so to
investigate a machine more rigorously you can use
Figure 3.
the p option to specify the ports you want to scan
for example all ports in the range 1-65535: nmap p 1-65535 192.168.1.150
(See figure 4)
The p option is also useful if you want to
investigate machines on your network with a
specific port open, such as port 139 (Netbios
session service):
To restrict your scan of port 139 to a subset of your
network, simply type in an IP address range: nmap
p 139 192.168.1.1-20 (See figure 5)
UDP Scanning
Figure 4.