Skip to content

Click on each book below to review & buy on Amazon.

As an Amazon Associate, I earn from qualifying purchases.


CompTIA Linux+ XK0-005 - 4.2 - Testing Remote Systems: nmap

This guide aims to provide you with a detailed understanding of nmap, a powerful network scanning tool used for testing remote systems. Whether you are a beginner or have limited background knowledge, this guide will help you gain insights into how to use nmap to perform various types of network detection, including scanning IP addresses, port scanning, and detecting service and OS versions.

What is nmap and the Types of Detection It Can Perform

nmap (Network Mapper) is a versatile and widely used network scanning tool. It allows you to discover and analyze network hosts, services, and vulnerabilities. With its comprehensive range of features, nmap enables you to perform different types of detection, including:

  • Host Discovery: nmap can scan a range of IP addresses to identify active hosts on a network. This helps in determining which hosts are online and accessible.
  • Port Scanning: nmap can scan for open ports on remote systems. It provides information about which ports are accepting connections, helping to identify potential services or vulnerabilities.
  • Version Detection: nmap can detect the versions of services and operating systems running on remote systems. This information can be useful for identifying outdated software, potential vulnerabilities, or determining the OS running on the target system.

Scanning a Range of IP Addresses

To scan a range of IP addresses using nmap, open a terminal and use the following command:

nmap <start_ip_address>-<end_ip_address>

Replace <start_ip_address> with the starting IP address of the range and <end_ip_address> with the ending IP address of the range. nmap will scan the specified range of IP addresses and provide information about the discovered hosts.

Example

$ nmap 192.168.0.1-192.168.0.254

  Starting Nmap 7.91 ( https://nmap.org ) at 2023-06-06 12:00 UTC
  Nmap scan report for 192.168.0.1
  Host is up (0.001s latency).
  Nmap scan report for 192.168.0.2
  Host is up (0.004s latency).
  ...
  Nmap scan report for 192.168.0.254
  Host is up (0.012s latency).

Port Scanning

To perform a port scan using nmap, open a terminal and use the following command:

nmap -p <port_range> <target_ip_address>

Replace <port_range> with the range of ports you want to scan (e.g., 1-1000) and <target_ip_address> with the IP address of the target system. nmap will scan the specified ports on the target system and provide information about the open ports.

Example

$ nmap -p 1-1000 192.168.0.100

  Starting Nmap 7.91 ( https://nmap.org ) at 2023-06-06 12:00 UTC
  Nmap scan report for 192.168.0.100
  Host is up (0.002s latency).

  PORT     STATE SERVICE
  22/tcp   open  ssh
  80/tcp   open  http
  443/tcp  open  https

Detecting Service Versions

To detect service versions using nmap, open a terminal and use the following command:

nmap -sV <target_ip_address>

Replace <target_ip_address> with the IP address of the target system. nmap will scan the target system and provide information about the versions of the services running on open ports.

Example

$ nmap -sV 192.168.0.100

  Starting Nmap 7.91 ( https://nmap.org ) at 2023-06-06 12:00 UTC
  Nmap scan report for 192.168.0.100
  Host is up (0.003s latency).

  PORT   STATE SERVICE VERSION
  22/tcp open  ssh     OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
  80/tcp open  http    Apache httpd 2.4.29 ((Ubuntu))

Detecting OS Versions

To detect the operating system (OS) version using nmap, open a terminal and use the following command:

nmap -O <target_ip_address>

Replace <target_ip_address> with the IP address of the target system. nmap will attempt to determine the operating system running on the target system and provide information about the detected OS.

Example

$ nmap -O 192.168.0.100

  Starting Nmap 7.91 ( https://nmap.org ) at 2023-06-06 12:00 UTC
  Nmap scan report for 192.168.0.100
  Host is up (0.003s latency).
  Not shown: 999 filtered ports
  PORT   STATE SERVICE
  22/tcp open  ssh

  Device type: general purpose
  Running: Linux 4.15.0-91-generic
  OS CPE: cpe:/o:linux:linux_kernel:4.15.0-91-generic
  OS details: Linux 4.15.0-91-generic

Conclusion

In this guide, we explored the topic of analyzing and troubleshooting network resource issues using the nmap command in Linux environments. We discussed nmap as a powerful network scanning tool and the different types of detection it can perform, including host discovery, port scanning, service version detection, and OS version detection. Additionally, we provided examples of how to use nmap to scan a range of IP addresses, perform port scanning, and detect service and OS versions.


Support DTV Linux

Click on each book below to review & buy on Amazon. As an Amazon Associate, I earn from qualifying purchases.

NordVPN ®: Elevate your online privacy and security. Grab our Special Offer to safeguard your data on public Wi-Fi and secure your devices. I may earn a commission on purchases made through this link.