Enumeration Using Nmap
Enumeration Using Nmap
Aim: To learn all the given commands for the Enumeration in NMAP
Commands:
Here are some common operations that can be performed with nmap. We will
run them all with sudo privileges to avoid returning partial results for some
queries. Some commands may take a long while to complete:
Scan for the host operating system:
A TCP “SYN” scan exploits the way that TCP establishes a connection.
To start a TCP connect ion, the requesting end sends a “synchronize request”
packet to the server. The server then sends a “synchronize acknowledgment”
packet back. The original sender then sends back an “acknowledgment” packet
back to the server, and a connection is established.
A “SYN” scan, however, drops the connect ion when the first packet is returned
from the server. This is called a “half-open” scan and used to be promoted as a
way to surreptitiously scan for ports, since the application associated with that
port would not receive the traffic, because the connection is never completed.
This is no longer considered stealthy with the adoption of more advanced
firewalls and the flagging of incomplete SYN request in many configurations.
8. sudo nmap -sS scanme.nmap.org