Nmap can be used to monitor individual hosts as well as extensive networks spanning hundreds of thousands of devices and multitudes of subnets.
Although Nmap has evolved over the years and is extremely flexible, at its core it is a port scanning tool that collects information by sending raw packets to system ports. Listen to responses and determine if ports are open, closed, or filtered in some way by, for example, a firewall. Other terms used for port scanning include port discovery or port enumeration.
Since its launch in 1997, Nmap has evolved, but the basis of its functionality remains port scanning.
Port scan
The packets that Nmap sends come back with IP addresses and a wealth of other data, allowing you to identify all kinds of network attributes, giving you a profile or map of the network, and allowing you to create an inventory of hardware and software.
One-of-a-kind protocols use exclusive kinds of packet systems. Nmap employs transport layer protocols including TCP (Transmission Control Protocol), UDP (User Datagram Protocol), and SCTP (Flow Control Transmission Protocol), as well as supporting protocols such as ICMP (Communication Message Protocol). Internet control), which are used to send error messages.
Different protocols serve different purposes and ports on the system. For example, UDP resource overhead is suitable for streaming video, where you sacrifice some lost packets for speed, while non-streaming videos on YouTube are buffered and use TCP. slower, although more reliable.
How to use Nmap
There is a wide range of free network monitoring utilities, as well as free open source vulnerability scanners available to network administrators and security auditors. What makes Nmap stand out as the tool IT and network administrators should know about is its flexibility and power. While the core of Nmap's functionality is port scanning, it enables a variety of related capabilities including:
• Network mapping: Nmap can identify the devices on a network (also called host discovery), including servers, routers, and switches, and how they are physically connected.
• OS Detection: Nmap can detect operating systems running on network devices (also called OS fingerprints), providing vendor name, underlying operating system, software version, and even an estimate of the time of delivery. device activity.
• Service discovery: Nmap can not only identify hosts on the network, but also whether they act as mail, web, or name servers, and the particular applications and versions of related software that they are running.
• Security Audit - Finding out what versions of operating systems and applications are running on network hosts allows network administrators to determine their vulnerability to specific flaws. If a network administrator receives an alert about a vulnerability in a particular version of an application, for example, they can scan their network to identify whether that version of software is running on the network and take steps to patch or update the relevant hosts. Scripts can also automate responsibilities consisting of detecting specific vulnerabilities.
Requirement:
1) Termux
2) Hacker's Keyboard
Procedure
1: Open the Termux app and type command pkg update and press Enter.
2: Now type command pkg install curl and press Enter, wait until it completes.
2: Now type command pkg install nmap and press Enter, wait until it complete.
pkg update and press Enter.pkg install curl and press Enter, wait until it completes.2: Now type command pkg install nmap and press Enter, wait until it complete.
3: How to use?
- Type command
nmap Yourweb/IP. Here you web is the hyperlink on your web or writes ip of your web. This will start the Nmap process you can check the status by pressing any key or cancel the process bt ctrl+c alternative volume-down +c.




0 Comments