SlideShare a Scribd company logo
3
Most read
4
Most read
5
Most read
Sreekanth N
Agenda
 Introduction
 Nmap- Features
 Options Summary
 Screenshots
 Results
 Conclusion
 References
Introduction
 Nmap  Network Mapper is a free and open source
utility for network discovery and security auditing.
 Useful for tasks such as network inventory, managing
service upgrade schedules, and monitoring host or
service uptime.
 Developed by Gordon Lyon.
 Turned 20 years on September 1, 2017!
 CurrentVersion is 7.70.
Features
 Nmap uses raw IP packets in novel ways to
determine what
 hosts are available on the network,
 services (application name and version) those hosts
are offering,
 operating systems (and OS versions) they are
running,
 type of packet filters/firewalls are in use, and
dozens of other characteristics.
 It was designed to rapidly scan large networks,
it will work against single host too.
 Nmap runs on all major computer operating
systems.
Features
 In addition to the classic command-line Nmap
executable, the Nmap suite includes:
 an advanced GUI and results viewer - Zenmap,
 a flexible data transfer, redirection, and debugging
tool - Ncat,
 a utility for comparing scan results - Ndiff,
 and a packet generation and response analysis tool
- Nping.
Options
Summary
 Target Specifications
 Host Discovery
 ScanTechniques
 Port Specifications and Scan Order
 Service/Version Detection
 Script Scan
 OS Detection
 Timing and Performance
 Firewall / IDS evasion and spoofing
 Output
Screenshots –
Nmap service
starting
Screenshots –
Scanning
www.mgit.ac.in
Screenshots –
Results
www.mgit.ac.in
Screenshots – Results www.mgit.ac.in
Conclusion
 Network scanning provides information about the
target, which is valuable regardless of whether you're
trying to attack the network or protect it from attack.
 While performing a basic scan Nmap provides a wide
array of options to tweak your scan to achieve the best
results.
 These features can make scans more accurate, less
likely to be detected, and faster to complete.
 Nmap's huge list of features and solid implementation
make it the go-to scanner for most scans.
Reference
 https://nmap.org/
 https://en.wikipedia.org/wiki/Nmap
 https://www.networkcomputing.com/networking/nma
p-tutorial-common-commands/520799832/page/0/2
ThankYou

More Related Content

PDF
Nmap basics
PPTX
Single source Shortest path algorithm with example
PPTX
Understanding NMAP
PPT
Port scanning
PPTX
PDF
First aid for kids
PDF
Security+ SY0-701 CERTIFICATION TRAINING.pdf
Nmap basics
Single source Shortest path algorithm with example
Understanding NMAP
Port scanning
First aid for kids
Security+ SY0-701 CERTIFICATION TRAINING.pdf

What's hot (20)

PPTX
PPTX
NMAP - The Network Scanner
PPTX
Nmap and metasploitable
PDF
Network Mapper (NMAP)
PDF
Nmap Basics
ODP
Scanning with nmap
PPTX
Introduction to Snort
PDF
Nmap tutorial
PDF
Hacking With Nmap - Scanning Techniques
PPTX
Nmap(network mapping)
PPT
intrusion detection system (IDS)
PPTX
Network scanning
PPTX
Recon with Nmap
PDF
Cyber security and demonstration of security tools
PPTX
Metasploit
PDF
Nessus Software
PPTX
Demo of security tool nessus - Network vulnerablity scanner
PPTX
Nessus-Vulnerability Tester
PDF
Threat hunting 101 by Sandeep Singh
PPTX
Zen map
NMAP - The Network Scanner
Nmap and metasploitable
Network Mapper (NMAP)
Nmap Basics
Scanning with nmap
Introduction to Snort
Nmap tutorial
Hacking With Nmap - Scanning Techniques
Nmap(network mapping)
intrusion detection system (IDS)
Network scanning
Recon with Nmap
Cyber security and demonstration of security tools
Metasploit
Nessus Software
Demo of security tool nessus - Network vulnerablity scanner
Nessus-Vulnerability Tester
Threat hunting 101 by Sandeep Singh
Zen map
Ad

Similar to Nmap (20)

PDF
Nmap basics-1198948509608024-3
PDF
A COMPREHENSIVE ANALYSIS OF NETWORK SCANNING AND SECURITY ASSESSMENT TOOL
DOCX
This Assignment consists of Amazon Web services
PPTX
Introduction-to-Nmap-and-Zenmap-GUI.pptx.pptx
PDF
A REVIEW ON NMAP AND ITS FEATURES
PPTX
PPTX
Centralized monitoring station for it computing and network infrastructure
PDF
Nmap | Network Mapping | Null Bhopal Chapter
DOC
10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...
DOCX
Lab 7 manual.docx Of Information security for students
PPTX
Exploring Kali Linux Tools for Website Scanning via IP Address
PDF
Network Programming with Umit project
DOCX
Contents namp
DOCX
Contents namp
PPT
Network Protocol Analyzer
PDF
OSMC 2012 | PMp - another approach to configure Nagios by Pierre Waellemacq
PPTX
Signal r core workshop - netconf
ODP
Nagios Conference 2013 - Spenser Reinhardt - Intro to Network Monitoring Usin...
PPTX
network monitoring system ppt
Nmap basics-1198948509608024-3
A COMPREHENSIVE ANALYSIS OF NETWORK SCANNING AND SECURITY ASSESSMENT TOOL
This Assignment consists of Amazon Web services
Introduction-to-Nmap-and-Zenmap-GUI.pptx.pptx
A REVIEW ON NMAP AND ITS FEATURES
Centralized monitoring station for it computing and network infrastructure
Nmap | Network Mapping | Null Bhopal Chapter
10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...
Lab 7 manual.docx Of Information security for students
Exploring Kali Linux Tools for Website Scanning via IP Address
Network Programming with Umit project
Contents namp
Contents namp
Network Protocol Analyzer
OSMC 2012 | PMp - another approach to configure Nagios by Pierre Waellemacq
Signal r core workshop - netconf
Nagios Conference 2013 - Spenser Reinhardt - Intro to Network Monitoring Usin...
network monitoring system ppt
Ad

More from Sreekanth Narendran (20)

PPTX
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
PPTX
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
PPTX
Information Systems Audit - Ron Weber chapter 1
PPTX
Quantum cryptography
PPTX
Transactional vs transformational leadership
PPTX
ECGC, Exim Bank, RBI, FEDAI, FEMA and SWIFT.
PPTX
Web services for banks
PPTX
Virus vs worms vs trojans
PPT
Business process reengineering
PPTX
PPTX
PPTX
International banking
PPTX
Master Data Management
PPTX
Maltego Information Gathering
PPTX
Leadership traits
PPTX
Network Miner Network forensics
PPTX
Autopsy Digital forensics tool
PPTX
Organizational development
PPTX
Conducting an Information Systems Audit
PPTX
Indigo Case study
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Audit - Ron Weber chapter 1
Quantum cryptography
Transactional vs transformational leadership
ECGC, Exim Bank, RBI, FEDAI, FEMA and SWIFT.
Web services for banks
Virus vs worms vs trojans
Business process reengineering
International banking
Master Data Management
Maltego Information Gathering
Leadership traits
Network Miner Network forensics
Autopsy Digital forensics tool
Organizational development
Conducting an Information Systems Audit
Indigo Case study

Recently uploaded (20)

PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
Digital Literacy And Online Safety on internet
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
Introduction to Information and Communication Technology
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
artificial intelligence overview of it and more
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Digital Literacy And Online Safety on internet
presentation_pfe-universite-molay-seltan.pptx
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Job_Card_System_Styled_lorem_ipsum_.pptx
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PptxGenJS_Demo_Chart_20250317130215833.pptx
SAP Ariba Sourcing PPT for learning material
Introduction to Information and Communication Technology
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Design_with_Watersergyerge45hrbgre4top (1).ppt
international classification of diseases ICD-10 review PPT.pptx
WebRTC in SignalWire - troubleshooting media negotiation
Sims 4 Historia para lo sims 4 para jugar
Module 1 - Cyber Law and Ethics 101.pptx
Introuction about WHO-FIC in ICD-10.pptx
Triggering QUIC, presented by Geoff Huston at IETF 123
Slides PDF The World Game (s) Eco Economic Epochs.pdf
artificial intelligence overview of it and more
APNIC Update, presented at PHNOG 2025 by Shane Hermoso

Nmap

  • 2. Agenda  Introduction  Nmap- Features  Options Summary  Screenshots  Results  Conclusion  References
  • 3. Introduction  Nmap  Network Mapper is a free and open source utility for network discovery and security auditing.  Useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.  Developed by Gordon Lyon.  Turned 20 years on September 1, 2017!  CurrentVersion is 7.70.
  • 4. Features  Nmap uses raw IP packets in novel ways to determine what  hosts are available on the network,  services (application name and version) those hosts are offering,  operating systems (and OS versions) they are running,  type of packet filters/firewalls are in use, and dozens of other characteristics.  It was designed to rapidly scan large networks, it will work against single host too.  Nmap runs on all major computer operating systems.
  • 5. Features  In addition to the classic command-line Nmap executable, the Nmap suite includes:  an advanced GUI and results viewer - Zenmap,  a flexible data transfer, redirection, and debugging tool - Ncat,  a utility for comparing scan results - Ndiff,  and a packet generation and response analysis tool - Nping.
  • 6. Options Summary  Target Specifications  Host Discovery  ScanTechniques  Port Specifications and Scan Order  Service/Version Detection  Script Scan  OS Detection  Timing and Performance  Firewall / IDS evasion and spoofing  Output
  • 10. Screenshots – Results www.mgit.ac.in
  • 11. Conclusion  Network scanning provides information about the target, which is valuable regardless of whether you're trying to attack the network or protect it from attack.  While performing a basic scan Nmap provides a wide array of options to tweak your scan to achieve the best results.  These features can make scans more accurate, less likely to be detected, and faster to complete.  Nmap's huge list of features and solid implementation make it the go-to scanner for most scans.
  • 12. Reference  https://nmap.org/  https://en.wikipedia.org/wiki/Nmap  https://www.networkcomputing.com/networking/nma p-tutorial-common-commands/520799832/page/0/2