Hacking Tony

Cyber security tutorials

User Tools

Site Tools


scan_nmap

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
scan_nmap [2017/09/10 20:18] Santiscan_nmap [2019/01/04 13:06] (current) – external edit 127.0.0.1
Line 1: Line 1:
 ===== How to scan computers/network with Nmap ===== ===== How to scan computers/network with Nmap =====
 +
 +{{ wiki:nmap.png?150}}
  
 In this tutorial we are going to see different ways to discover computers in a network and how to scan their ports to get some extra information about them. To do that we will use [[http://www.nmap.org|Nmap]], a very powerful tool. In this tutorial we are going to see different ways to discover computers in a network and how to scan their ports to get some extra information about them. To do that we will use [[http://www.nmap.org|Nmap]], a very powerful tool.
Line 72: Line 74:
 </code> </code>
  
-Because the firewall was disabled we have obtained a lot of information about the remote computer: open ports, services running, MAC address and some extra information about which version of Windows is running and a aproximation about how updated it is (Service Packs installed on remote computer). Now we can see how importat is to enable our Firewall in our computer. If some attacker does not know nothing about our computer it will be more difficult to receive any kind of attack from anyone.+Because the firewall was disabled we have obtained a lot of information about the remote computer: open ports, services running, MAC address and some extra information about which version of Windows is running and a approximation about how updated it is (Service Packs installed on remote computer). Now we can see how important is to enable our Firewall in our computer. If some attacker does not know nothing about our computer it will be more difficult to receive any kind of attack from anyone.
  
 And we can also perform an **intensive scan** to get more information about the remote computer such as which version of some services are installed, the computer name, and more. To see one example of discovering some services in the remote computer, we have installed Filezilla FTP Server in the Windows 7 machine. And we can also perform an **intensive scan** to get more information about the remote computer such as which version of some services are installed, the computer name, and more. To see one example of discovering some services in the remote computer, we have installed Filezilla FTP Server in the Windows 7 machine.
Line 137: Line 139:
 </code> </code>
  
-<code bash> +From now on we will have to choose a more specific tool depending of the service that we will want to test. Maybe, in this case, because we have found that the remote machine has a FTP service running we could try to discover some vulnerability to check that our system is completely protected.
-santi@kalibook:$  +
-</code>+
  
-<code bash> +===== How to prevent this kind of attack ===== 
-santi@kalibook: + 
-</code>+Maybe scanning ports cannot be consider a kind of attack but sometimes it will be the very first step for preparing an inminent attack in the future. That's why we must protect our computers to not be scanned, and the best way to do that is **enabling our Firewall**. Notice that that simple action can protect your computer against more sophisticated attacks because if the attacker doesn't know nothign about your computer, maybe he never will attack. 
 + 
 +---- 
 + 
 +(c) 2017 Hacking Tony
scan_nmap.1505074693.txt.gz · Last modified: 2019/01/04 13:06 (external edit)