SlideShare a Scribd company logo
3
Most read
9
Most read
10
Most read
Jen Beveridge and Joe Kolenda
N map presentation
• Developed by Gordon Lyon
• Features
– Host discovery
– Port scanning
– Version detecting
– OS detection
– Scriptable interaction with the target
secret.pathetic.net
• Identifying open ports
• Network Mapping
• Auditing security
• Runs on Linux, Windows, Mac OS X and other
smaller operating systems
• GUI options:
– Zenmap
– XNMap
– NmapFE
• DNS lookup- matches name with IP
• NMap pings the remote target with 0 byte
packets to each port
– If packets are not received back, port is open
– If packets are received, port is closed
• Sends different packets with different timing
to determine filtered/unfiltered, version, etc.
• Firewalls can interfere with this process
• Displays open ports
• Different output based upon constraints on
run, but can show
– Version type
– Filtered/unfiltered
• When run through command prompt or
terminal, entry fields are:
– Program
– Constraints on run
– Target
• Ex. > nmap –sS scanme.nmap.org
• Ex. > nmap -Db ftp.pathetic.net
secret.pathetic.net
• Easy to install
• Fairly easy to use, firewall problems and
network setting issues
• User guide available, many tutorials
• Scan time- can range from a few seconds to
several hours
• Can scan over a range of IP addresses and
utilize stealthy scanning
• Can be used for hacking- to discover
vulnerable ports
• System admins can use it to check that
systems meet security standards
• Unauthorized use of Nmap on a system could
be illegal. Make sure you have permission
before using this tool

More Related Content

PPTX
PDF
Hacking With Nmap - Scanning Techniques
PPTX
PPTX
Understanding NMAP
PDF
Nmap Hacking Guide
PPTX
ODP
Scanning with nmap
Hacking With Nmap - Scanning Techniques
Understanding NMAP
Nmap Hacking Guide
Scanning with nmap

What's hot (20)

PDF
Nmap basics
PPTX
NMAP - The Network Scanner
PDF
Nmap tutorial
PPTX
Nmap and metasploitable
PDF
Nmap Basics
PDF
Network Mapper (NMAP)
PPTX
Introduction to Snort
PPTX
Recon with Nmap
PPT
Wireshark Basics
PPTX
Metasploit
PPTX
WTF is Penetration Testing v.2
PPTX
Intrusion prevention system(ips)
PPTX
Wireshark network analysing software
PPTX
Penetration testing reporting and methodology
PDF
Nmap scripting engine
PPTX
Network scanning
PPTX
Nmap(network mapping)
PPTX
Samba power point presentation
Nmap basics
NMAP - The Network Scanner
Nmap tutorial
Nmap and metasploitable
Nmap Basics
Network Mapper (NMAP)
Introduction to Snort
Recon with Nmap
Wireshark Basics
Metasploit
WTF is Penetration Testing v.2
Intrusion prevention system(ips)
Wireshark network analysing software
Penetration testing reporting and methodology
Nmap scripting engine
Network scanning
Nmap(network mapping)
Samba power point presentation
Ad

Similar to N map presentation (20)

PDF
IT262 CEH1 Unit 3 - Certified Ethical Hacker
PPT
Network Scanning Phases and Supporting Tools
PPTX
Network scanning
PPTX
DC612 Day - Hands on Penetration Testing 101
PPTX
Nous Sommes Cyber - HTB Blue
PDF
Using Nagios to monitor your WO systems
PDF
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
PPTX
Network Penetration Testing
PDF
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
PPT
01204427-scanner.ppt
PPT
Unix Internals OS Architecture
PPT
NMAP1.ppt
PDF
nmap-150817055204-lva1-app6891_٠٩٥٩٣٥ (1).pdf
PDF
Ch 5: Port Scanning
PPTX
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
PDF
Complete Nmap Scanning Commands CheatSheet by Hackopedia Utkarsh Thakur
PDF
2024 DAPUG Conference Arnaud Bouchez FPC and Lazarus
PDF
Practical White Hat Hacker Training - Active Information Gathering
IT262 CEH1 Unit 3 - Certified Ethical Hacker
Network Scanning Phases and Supporting Tools
Network scanning
DC612 Day - Hands on Penetration Testing 101
Nous Sommes Cyber - HTB Blue
Using Nagios to monitor your WO systems
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
Network Penetration Testing
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
01204427-scanner.ppt
Unix Internals OS Architecture
NMAP1.ppt
nmap-150817055204-lva1-app6891_٠٩٥٩٣٥ (1).pdf
Ch 5: Port Scanning
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Complete Nmap Scanning Commands CheatSheet by Hackopedia Utkarsh Thakur
2024 DAPUG Conference Arnaud Bouchez FPC and Lazarus
Practical White Hat Hacker Training - Active Information Gathering
Ad

Recently uploaded (20)

PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
Sims 4 Historia para lo sims 4 para jugar
DOCX
Unit-3 cyber security network security of internet system
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
Funds Management Learning Material for Beg
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
innovation process that make everything different.pptx
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
artificial intelligence overview of it and more
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
INTERNET------BASICS-------UPDATED PPT PRESENTATION
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Cloud-Scale Log Monitoring _ Datadog.pdf
Job_Card_System_Styled_lorem_ipsum_.pptx
Module 1 - Cyber Law and Ethics 101.pptx
WebRTC in SignalWire - troubleshooting media negotiation
Sims 4 Historia para lo sims 4 para jugar
Unit-3 cyber security network security of internet system
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Funds Management Learning Material for Beg
QR Codes Qr codecodecodecodecocodedecodecode
Decoding a Decade: 10 Years of Applied CTI Discipline
innovation process that make everything different.pptx
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PptxGenJS_Demo_Chart_20250317130215833.pptx
artificial intelligence overview of it and more
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Triggering QUIC, presented by Geoff Huston at IETF 123
international classification of diseases ICD-10 review PPT.pptx
presentation_pfe-universite-molay-seltan.pptx

N map presentation

  • 1. Jen Beveridge and Joe Kolenda
  • 3. • Developed by Gordon Lyon • Features – Host discovery – Port scanning – Version detecting – OS detection – Scriptable interaction with the target secret.pathetic.net
  • 4. • Identifying open ports • Network Mapping • Auditing security
  • 5. • Runs on Linux, Windows, Mac OS X and other smaller operating systems • GUI options: – Zenmap – XNMap – NmapFE
  • 6. • DNS lookup- matches name with IP • NMap pings the remote target with 0 byte packets to each port – If packets are not received back, port is open – If packets are received, port is closed • Sends different packets with different timing to determine filtered/unfiltered, version, etc. • Firewalls can interfere with this process
  • 7. • Displays open ports • Different output based upon constraints on run, but can show – Version type – Filtered/unfiltered
  • 8. • When run through command prompt or terminal, entry fields are: – Program – Constraints on run – Target • Ex. > nmap –sS scanme.nmap.org • Ex. > nmap -Db ftp.pathetic.net secret.pathetic.net
  • 9. • Easy to install • Fairly easy to use, firewall problems and network setting issues • User guide available, many tutorials • Scan time- can range from a few seconds to several hours • Can scan over a range of IP addresses and utilize stealthy scanning
  • 10. • Can be used for hacking- to discover vulnerable ports • System admins can use it to check that systems meet security standards • Unauthorized use of Nmap on a system could be illegal. Make sure you have permission before using this tool