Nmap is a Network maping tools.
Original author(s) | Gordon Lyon (Fyodor) |
|---|
| Initial release | September 1997; 25 years ago |
|---|
Stable Release | 7.92 / 7 August 2021; 12 months ago |
|---|
| Repository | |
|---|
| Written in | C, C++, Python, Lua |
|---|
| Operating System | Cross-platform |
|---|
| Available in | English |
|---|
| Type | Network security
|
|---|
| License | NPSL or modified GPLv2 or proprietary |
|---|
| Website | nmap.org
|
|---|
Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection. These features are extensible by scripts that provide more advanced service detection, vulnerability detection, and other features. Nmap can adapt to network conditions including latency and congestion a scan.
Nmap started as a Linux utility and was ported to other systems including Windows, macOS, and BDS. It is most popular on Linux, followed by Windows.
Port States in Nmap
State Description
Open --------- Accepting Connection requests
Closed ---- No Service responding to requests
Filtered ---- Blocked by a firewall
Unfiltered ------ Accessible, But scanner was unable to determine Whether open or closed.
How does Nmap work?
The heart of Nmap is port scanning. How it works is that users designate a list of targets on a network that they want to learn information about. Users don’t need to identify specific targets, which is good because most administrators don’t have a complete picture of everything that is using the potentially thousands of ports on their network. Instead, they compile a range of ports to scan.
It’s also possible to scan all network ports, although that would potentially take a lot of time and eat up quite a bit of available bandwidth. Plus, depending on the type of passive defenses that are in use on the network, such a massive port scan would likely trigger security alerts. As such, most people use Nmap in more limited deployments or divide different parts of their network up for scheduled scanning over time.
In addition to setting up a range targets to be scanned, users can also control the depth of each scan. For example, a light or limited scan might return information about which ports are open and which have been closed by firewall settings. More detailed scans could additionally capture information about what kind of devices are using those ports, the operating systems they are running and even the services that are active on them. Nmap can also discover deeper information, like the version of those discovered services. That makes it a perfect tool for finding vulnerabilities or assisting with patch management efforts.
Controlling the scans used to require console commands, which of course means that some training was required. But the new Zenmap graphical interface makes it easy for just about everyone to tell Nmap what they want it to discover, with or without formal training. Meanwhile, professionals can continue to use the console commands they always have, making it a useful tool for both experts and novices alike.
Comments
Post a Comment