Top Banner
NMAP Jen Beveridge and Joe Kolenda
10

N map presentation

Aug 13, 2015

Download

Internet

ulirraptor
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: N map presentation

NMAP

Jen Beveridge and Joe Kolenda

Page 2: N map presentation
Page 3: N map presentation

History of NMAP

• Developed by Gordon Lyon• Features

– Host discovery– Port scanning– Version detecting– OS detection– Scriptable interaction with the target

secret.pathetic.net

Page 4: N map presentation

Uses of NMAP

• Identifying open ports• Network Mapping• Auditing security

Page 5: N map presentation

Tool Environment

• Runs on Linux, Windows, Mac OS X and other smaller operating systems

• GUI options:– Zenmap– XNMap– NmapFE

Page 6: N map presentation

How It Works

• DNS lookup- matches name with IP• NMap pings the remote target with 0 byte

packets to each port– If packets are not received back, port is open– If packets are received, port is closed

• Sends different packets with different timing to determine filtered/unfiltered, version, etc.

• Firewalls can interfere with this process

Page 7: N map presentation

Output from NMAP

• Displays open ports• Different output based upon constraints on

run, but can show– Version type– Filtered/unfiltered

Page 8: N map presentation

Basic NMAP scans

• When run through command prompt or terminal, entry fields are:– Program– Constraints on run– Target

• Ex. > nmap –sS scanme.nmap.org• Ex. > nmap -Db ftp.pathetic.net

secret.pathetic.net

Page 9: N map presentation

User Experience

• Easy to install• Fairly easy to use, firewall problems and

network setting issues• User guide available, many tutorials• Scan time- can range from a few seconds to

several hours• Can scan over a range of IP addresses and

utilize stealthy scanning

Page 10: N map presentation

Ethical Issues

• Can be used for hacking- to discover vulnerable ports

• System admins can use it to check that systems meet security standards

• Unauthorized use of Nmap on a system could be illegal. Make sure you have permission before using this tool