Jumat, 30 September 2011

Using NMAP scan on Backtrack 5

Here are some really cool scanning techniques using Nmap

1) Get info about remote host ports and OS detection


nmap -sS -P0 -sV -O <target>



Where < target > may be a single IP, a hostname or a subnet

-sS TCP SYN scanning (also known as half-open, or stealth scanning)
-P0 option allows you to switch off ICMP pings.
-sV option enables version detection
-O flag attempt to identify the remote operating system Other option:
-A option enables both OS fingerprinting and version detection
-v use -v twice for more verbosity.


nmap -sS -P0 -A -v < target >

2) Get list of servers with a specific port open


nmap -sT -p 80 -oG – 192.168.1.* | grep open

Change the -p argument for the port number. See “man nmap” for different ways to specify address ranges.