Udemy

What is Nmap?

A free video tutorial from Nathan House
Leading Cyber Security Expert - CEO of StationX
Rating: 4.5 out of 5Instructor rating
7 courses
376,208 students
What is Nmap

Learn more from the full course

The Complete Nmap Ethical Hacking Course : Network Security

Become an expert in the ethical hacking and network security tool Nmap!

04:29:27 of on-demand video • Updated August 2020

You will become an expert in using Nmap for ethical hacking, system administration and network security.
Learn how to successfully discover active and vulnerable hosts on a network.
Discover the secrets of ethical hacking and network discovery, using Nmap on this complete course.
You will explore the Nmap Scripting Engine (NSE) used for more advanced discovery and hacking. We look at many scripts including those used for brute forcing passwords in email and databases, cross-site scripting (XSS) and SQL injection (SQLi) discovery and other cool Nmap scripts.
Learn Firewall and Intrusion detection evasion, Nmap output (convert, merge and compare) results, Zenmap (Nmap GUI) and how criminal black hat hackers use Nmap.
Scan to determine firewall rules while avoiding intrusion detection systems (IDS).
You will understand how Nmap is used in combination with criminal hacking infrastructures (command and control) servers.
Importantly we cover the both the command line version of Nmap and the GUI version of Nmap called Zenmap.
Plus I include some great extra bonuses, like useful bash scripts to use with Nmap and an amazing cheat sheet to easily remember complex commands.
You will explore Nmap Installation, Hacking Labs, Network and port scanner basics, Target selection, Port states, Host discovery, Scan techniques and Port selection.
You will master Service detection, Version detection, Operating system detection, and optimizing Timing and performance.
English [Auto]
Let's start by giving you a quick introduction as to what Nmap is. Nmap short for network mapper is a free and open source command line tool for network discovery and security assessment. It is used by ethical hackers, penetration testers, systems, administrators, black hat hackers and anyone in fact, who wants to understand more about the devices on a given network. It is also often called a network scanner or a port scanner because it scans for open ports on devices. But it has much more functionality than just a simple port or network scanner and port scanning. If you're not familiar with what that means, what that term is, well, this will tell the user of the scanner what ports are open on the scan devices and therefore what services are running, such as As you can see here, we've got Port 22 open. So we know on this device, which happens to be 192.168.1.1. That that is potentially SSH and it's given us some version information here so we can see that this is SSH or it could be port 80 and it could be Http web server or 53, which is a DNS server. So that is what a port scanner does. That is what Nmap does. It determines whether the host is up and it determines what the host is running on it. And it can do that across multiple different domain names and IP addresses. And Nmap uses raw IP packets specially crafted in order to determine this. So it tells you, as I've said, what hosts are available on a given network, what services. As we can see here, the services like the application name and the version the host that are available. In this instance, we can see 192.168.1, as I've said, and potentially what operating system we can see here, Linux, we can see here the Linux kernel and depending on the scan what type of packet filtering firewalls are in use and many other characteristics can be deemed using Nmap. Nmap also has a powerful scripting capability. It allows users to write and share scripts using the Lua Lua programming language to automate a wide variety of networking tasks, including things like network discovery, more sophisticated version detection and vulnerability detection. It can be used, the scripting can be used for vulnerability, exploitation and even brute forcing. Emma was designed to rapidly scan large networks but works fine against single host to Nmap runs on all major operating systems and official binaries are available for Linux, Windows and Mac OS X to name a few. In addition to the classic command line Nmap executable which you can see the output here. The Nmap suite also includes a gooey called zenmap, which you can see here for a graphical interface to Nmap, all of which we're going to go through on this course. So that was your quick introduction to Nmap, so let's carry on.