1 / 17

Nmap Tutorial For Beginners | Nmap Vulnerability Scan Tutorial | Simplilearn

In this presentation on Nmap Tutorial for beginners, we cover the basic explanation and operation of nmap. We also have a nmap vulnerability scan tutorial at the end of our lesson where we use Nmap to run multiple scans and breach a windows computer. This nmap hacking tutorial also lists the different modes of scanning and a couple of alternative tools to be considered.<br><br>1. Introduction <br>2. Phases In Ethical Hacking<br>3. What Is N-Map?<br>4. Modes of Operation<br>5. Alternatives to N-Map<br>6. Live Demonstration

Simplilearn
Download Presentation

Nmap Tutorial For Beginners | Nmap Vulnerability Scan Tutorial | Simplilearn

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Phases In Ethical Hacking What Is N-Map? How Does N-Map Work? Modes of Operation Alternatives to N-Map Live Demonstration Agenda for the Day

  2. Phases In Ethical Hacking

  3. Click here to watch the video

  4. Phases In Ethical Hacking

  5. What Is N-Map?

  6. Open source and free network scanner created by Gordon Lyon • Used during reconnaissance stage of hacking • Can discover hosts and services on a system by the responses received • Finds vulnerable ports and services on a network What Is N-Map?

  7. How Does N-Map Work?

  8. Specially-crafted packets to generate replies How Does N-Map Work? Victim Machine Host replies to Nmap’s requests for analysis Life of host, Ports opened, Services Used, Host OS

  9. Modes of Operation

  10. Ping Sweep • SYN Scan • TCP Connect Scan • Idle Scan • RPC Scan • Windows Scan • Bounce Scan • UDP Scan • FIN Scan • NULL Scan Modes of Operation

  11. Alternatives to N-Map

  12. Alternatives to N-Map

  13. Live Demonstration

  14. Installing N-Map on a fresh system • Running different types of scans • Using different scan filters • Scanning for vulnerabilities on attack box machines Live Demonstration

More Related