Thread: The Nmap Thread
View Single Post
Posts: 31 | Thanked: 41 times | Joined on Dec 2009 @ United States
#1
What is Nmap?

Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes a flexible data transfer, redirection, and debugging tool (Ncat), and a utility for comparing scan results (Ndiff).
The Nmap suite also includes an advanced GUI and results viewer (Zenmap), but it is not optimized for Fremantle.

The Nping utility is now also included with the Nmap suite.

What can I do with Nmap?

Nmap is typically used to scan networks for hosts and their available ports/services. The latest versions include the ability to execute pre-packaged scripts, which can do everything from service detection and interrogation to finding hosts that are potentially susceptible to worm infection. If you administer a network in any capacity, Nmap is your friend!

Nmap on Maemo 5/Fremantle

Nmap 5.59BETA1 is now available in Extras-testing!
The software hosted in extras-testing is not ready for normal users!
PLEASE use it only for testing purposes. Be ready to file proper bug reports instead of posting complaints.
Potential problems: crashes, battery drain, poor system performance, full disk space & more - SERIOUSLY!

Backing up your data is recommended. In case of trouble you might need to re-flash your device.
Extras-testing - Nmap 5.59BETA1

Nmap 5.50 is currently available for Fremantle in Extras.

Extras - Nmap 5.50

Some Nmap scanning operations (such as OS fingerprinting) require root privileges. This Nmap package gives you the ability to use 'sudo nmap'.

Screenshots of Nmap on the N900

Running an OS fingerprint scan against localhost (an N900)


Running an OS fingerprint scan against a Windows XP virtual machine


Running the 'SMB OS Discovery' script to show Windows OS specific details


Running the 'SMB Security Mode' script to show supported authentication types


Using the 'SMB Check Vulns' script to show that this host is potentially vulnerable to the Conficker worm


More coming soon!

Zenmap on the N900

Zenmap does run on the N900, and can be executed from the command line by running 'zenmap'. Several changes are needed to make Zenmap run properly on Fremantle, including some interface adjustments to make the user experience as smooth as possible.

Check back, updates will be posted here!


More information

Nmap Homepage

Official Nmap documentation

Scanning Windows Deeper with the Nmap Scanning Engine [PDF]

Detecting Conficker with Nmap

Last edited by terminal3; 2011-07-13 at 23:48. Reason: Updated for Nmap 5.59BETA1 release
 

The Following 11 Users Say Thank You to terminal3 For This Useful Post: