O'Reilly logo

Learning Metasploit Exploitation and Development by Aditya Balapure

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Working with Nmap

Nmap is a powerful security scanner developed by Gordon Lyon, and is used for host, service, and open ports detection on a computer network. It has many features such as stealth scan, aggressive scan, firewall evasion scan, and has the ability to fingerprint operating systems. It has its own Nmap Scripting Engine, which can be used along with the Lua programming language to write the customized scripts.

We start from basic techniques on Nmap scanning using Metasploit.

Scanning a single target—running Nmap with no command options will perform a basic scan on the target address. The target can be given as an IPV4 address or its hostname. Let's see how it works. Open terminal or msfconsole, and type nmap <target>, for example, nmap ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required