![]() Like most low level tools, Nmap is best run from command line. While it does supplement more complex tools like Metasploit, an average developer can get it up and running in minutes - so lets get cracking on the installation. Some may think of it as a hacking tool, but it's more accurate to think of it as a recon tool. Shooting packets to specified locations & listening for responses provides intel on hosts, ports, services, operating systems, hardware, vulnerabilities & potential exploits. Think of it like echolocation for networks. Without venturing too far in the "technical weeds", Nmap utilizes raw packets to probe ports on network devices. Nmap is short for "Network Mapper" and it was originally crafted in C by Gordon Lyon (aka Fyodor). ![]() This NMap tutorial provides a brief background, install instructions & a walk-through of its most crucial functions. With almost a decade under its belt, NMap has grown into an indispensable utility for ethical hackers, pentesters & network pros alike. Category: Freebies - Web Dev Tools & Graphic Design Freebies, Advanced Web Design Tutorials & CMS Tutorials
0 Comments
Leave a Reply. |