Nmap

Nmap is a useful tool for mapping your target

  1. Enumerate targets
  2. Disover live hosts
  3. Reverse-DNS lookup
  4. Scan ports
  5. Detect version
  6. Detect OS
  7. Traceroute
  8. Scripts
  9. Write output

Enumerate Targets

This first phase inolves scanning the entire network to see what devices are reachable.

NMAP can be supplied with:

Host Discovery

For a local network nmap uses ARP requests (privleged user).

For an outside network nmap uses ICMP echo requests, TCP ACK on port 80, TCP SYN to port 443 (priveleged user).

For an outside network nmap uses TCP 3-Way Handshake to ports 80 and 443 (unpriveleged user).

By default nmap will use a ping scan to find live targets from the list and then will only scan those.

Important Flags for this Stage

Reverse-DNS Lookup

Not entirely sure.

Scan Ports