InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

Member-only story

Mastering Reconnaissance with Nmap: Unveiling Your Target’s Secrets

Ajay Naik
InfoSec Write-ups
Published in
3 min readSep 9, 2024

--

Nmap (Network Mapper) is one of the most powerful and widely-used open-source tools for network discovery and security auditing. It’s a must-have for any penetration tester or cybersecurity professional, enabling users to discover hosts, open ports, services, and even potential vulnerabilities within a network.

1. Basic Nmap Scanning

Start by mastering the basic syntax and options:

  • Ping Scan (Determine if the host is up):

nmap -sn <target>

This will perform a simple ping to see if the host responds.

  • Service and Version Detection:

nmap -sV <target>

This option detects open ports and attempts to identify the version of the service running on them.

  • OS Detection:

nmap -O <target>

This tries to determine the operating system on the target host.

2. Aggressive Scanning

Use the -A flag to combine multiple scans (OS detection, version detection, script scanning, and traceroute) in a single command:

nmap -A <target>

--

--

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Ajay Naik

Cyber security Expert with a Strong Focus on Penetration Testing, Threat Intelligence, and Bug Bounty Hunting.

No responses yet

Write a response