NMAP - Commands | Shahul Hameed
Scanning Methodology — A Roadmap This guide gives you a quick end-to-end roadmap of pen-test activity using nmap. To Whom It Concern: This article is for beginners in the cybersecurity domain who wants to get a quick practical guide on Pen Testing systems via the nmap. First thing first, you will need a Network exploration tool and security/port scanner. We will be using the nmap tool . If you don’t have Nmap installed, you can get it from here . It’s free…! We can use both Graphical version or via terminal. Methodology Look for Live Systems Check for Open Ports Banner Grabbing Vulnerability Scan Penetration Test Report 1. Check for Live Systems We have to search for any alive systems present in our scope environment. We will perform a sweep over a network. nmap -sP 192.168.205.1/24 Now, we have a total of 6 hosts that are Up out of 256 IP address sweep. 2. Check for Open Ports The next task to be done would be to do a port scanning to obtain information about open ports running on