NMAP - protect your important machines from crackers |
---|
When a cracker decides to case your site, one of the tools he or she will probably use is nmap. Nmap (think "network mapper") fulfills three goals of a reconnaissance taken before an attack:
Nmap is also a security tool. You can download compiled versions of nmap for Linux http://www.insecure.org/nmap, or source code that can be compiled for many versions of UNIX, for free. Using nmap yourself helps you level the playing field you share with crackers. Installation gunzip nmap-2.53.tgz Examples Here are some examples of using nmap, from simple and normal to a little more complex. The author of nmap do not think portscanning other networks is illegal; nor should portscans be construed by others as an attack. Get permission first or use at your own risk, more examples can be found in the man pages. nmap -v www.akadia.com This option scans all reserved TCP ports on the machine www.akadia.com . The -v means turn on verbose mode. Starting nmap V. 2.53 by fyodor@insecure.org nmap -sS -O www.akadia.com Launches a stealth SYN scan against www.akadia.com. It also tries to determine what operating system is running on each host that is up and running. This requires root privileges because of the SYN scan and the OS detection. Starting nmap V. 2.53 by fyodor@insecure.org |