What Is Nmap?Fully Explanation and How to Install It In Termux Without Root ?


What is Nmap?

Nmap can be used to monitor individual hosts as well as extensive networks spanning hundreds of thousands of devices and multitudes of subnets.
Although Nmap has evolved over the years and is extremely flexible, at its core it is a port scanning tool that collects information by sending raw packets to system ports. Listen to responses and determine if ports are open, closed, or filtered in some way by, for example, a firewall. Other terms used for port scanning include port discovery or port enumeration.
Since its launch in 1997, Nmap has evolved, but the basis of its functionality remains port scanning.
Port scan
The packets that Nmap sends come back with IP addresses and a wealth of other data, allowing you to identify all kinds of network attributes, giving you a profile or map of the network, and allowing you to create an inventory of hardware and software.
One-of-a-kind protocols use exclusive kinds of packet systems. Nmap employs transport layer protocols including TCP (Transmission Control Protocol), UDP (User Datagram Protocol), and SCTP (Flow Control Transmission Protocol), as well as supporting protocols such as ICMP (Communication Message Protocol). Internet control), which are used to send error messages.
Different protocols serve different purposes and ports on the system. For example, UDP resource overhead is suitable for streaming video, where you sacrifice some lost packets for speed, while non-streaming videos on YouTube are buffered and use TCP. slower, although more reliable. 

How to use Nmap
There is a wide range of free network monitoring utilities, as well as free open source vulnerability scanners available to network administrators and security auditors. What makes Nmap stand out as the tool IT and network administrators should know about is its flexibility and power. While the core of Nmap's functionality is port scanning, it enables a variety of related capabilities including:
• Network mapping: Nmap can identify the devices on a network (also called host discovery), including servers, routers, and switches, and how they are physically connected.
• OS Detection: Nmap can detect operating systems running on network devices (also called OS fingerprints), providing vendor name, underlying operating system, software version, and even an estimate of the time of delivery. device activity.
• Service discovery: Nmap can not only identify hosts on the network, but also whether they act as mail, web, or name servers, and the particular applications and versions of related software that they are running.
• Security Audit - Finding out what versions of operating systems and applications are running on network hosts allows network administrators to determine their vulnerability to specific flaws. If a network administrator receives an alert about a vulnerability in a particular version of an application, for example, they can scan their network to identify whether that version of software is running on the network and take steps to patch or update the relevant hosts. Scripts can also automate responsibilities consisting of detecting specific vulnerabilities.

Requirement:

1) Termux

2) Hacker's Keyboard 

Procedure

1: Open the Termux app and type command pkg update and press Enter.
2: Now type command pkg install curl and press Enter, wait until it completes.
2: Now type command pkg install nmap and press Enter, wait until it complete.

3: How to use?
  • Type commandnmap Yourweb/IP . Here you web is the hyperlink on your web or writes ip of your web. This will start the Nmap process you can check the status by pressing any key or cancel the process bt ctrl+c alternative volume-down +c.

                  Enjoy NMap In Non Rooted Device

DISCLAIMER

This Tutorial is made for educational purpose only, I didn't harm anyone everything shown an used in this Tutorial for testing belongs to me such as the computer, smartphone and my website. Every Tutorial on utopian.io is made to teach people how to stay safe and help others for making them safe.
HACKING, CRACKING, STEALING OR ANY SUCH KIND OF ACTIVITY IS A CYBER CRIME WHICH CAN LAND YOU IN JAIL. I DO NOT SUPPORT ANY SUCH KIND OF ACTIVITY
 

Post a Comment

0 Comments

/*GeneratePress Customization by web insights*/ .page-header-image-single .attachment-full{ box-shadow: rgba(23,43,99,.3) 0 7px 28px; border-radius:25px; } .entry-content h2,h3,h4,h5,h6{ font-weight:600; padding: 10px 10px 10px 25px; background-image: linear-gradient(to right, #1FA2FF 0%, #12D8FA 50%, #1FA2FF 100%); border-radius:10px; color:white!important; box-shadow: rgba(23,43,99,.3) 0 7px 28px; } .entry-content h2{ font-size:25px!important; } .entry-content h3{ font-size:21px!important; } .entry-content h4{ font-size:17px!important; } .entry-content h5{ font-size:15px!important; } .entry-content h6{ font-size:13px!important; } .comment-respond .comment-reply-title{ padding: 10px 10px 10px 25px; background-image: linear-gradient(to right, #1FA2FF 0%, #12D8FA 50%, #1FA2FF 100%); border-radius:10px; font-weight:600; color:white!important; font-size:22px!important; box-shadow: rgba(23,43,99,.3) 0 7px 28px; } /*End of Article Page Design*/ /*Sidebar Universal*/ .widget-title{ padding: 10px 10px; background-image: linear-gradient(to right, #1FA2FF 0%, #12D8FA 50%, #1FA2FF 100%); border-radius:10px; font-weight:500; color:white!important; font-size:18px!important; text-align:center; box-shadow: rgba(23,43,99,.3) 0 7px 28px; } .sidebar .widget { box-shadow: rgba(23,43,99,.3) 0 6px 18px; border-radius: 5px; } .sidebar .widget:first-child {background-image: linear-gradient(to right, #1FA2FF 0%, #12D8FA 50%, #1FA2FF 100%)} .button.light { background-color: #fff; border-radius: 50px; font-weight: 700; color:#333; } .button.light:hover { background: #333; color: #fff; } /*End of sidebar code*/ /*End of sidebar code*/ @media (min-width: 769px) { .post-image-aligned-left .post-image img { margin-top: -20px; border-radius: 12px; box-shadow: rgba(23,43,99,.2) 0 7px 28px!important; } } /* Mobile query */ @media (max-width: 768px) { .post-image-aligned-left .post-image img { margin-top: -20px; border-radius: 12px; box-shadow: rgba(23,43,99,.2) 0 7px 28px!important; } } /* Widget Sticky */ @media (min-width: 769px) { .site-content { display: flex; } .inside-right-sidebar { height: 100%; } .inside-right-sidebar aside:last-child { position: -webkit-sticky; position: sticky; top: 10px; } } /* Read More button Style */ a.read-more.button {background-image: linear-gradient(to right, #1FA2FF 0%, #12D8FA 51%, #1FA2FF 100%)} a.read-more.button { font-size:14px; padding: 10px 25px; text-align: center; transition: 0.5s; background-size: 200% auto; color: white; box-shadow: rgba(23,43,99,.3) 0 7px 28px; border-radius: 120px; } a.read-more.button:hover { background-position: right center; /* change the direction of the change here */ color: #fff; text-decoration: none; } /* Read More button Style */ blockquote { background: #dcdcdc54; border-left: 5px solid #1EA4FF; padding: 15px; font-style: inherit; font-size: 18px; margin: 0 0 1.5em; }