Friday, October 16, 2020

Lecture -17. Ndiff for Bug Bounty

Lecture -16. Zenmap The Nmap GUI

Lecture -15. Nmap for Python

Lecture -14. Nmap Firewall & IDS Bypass

Lecture -13. Mail Exploitation

Lecture -12. Nmap for Reconnaisance

Lecture -11. Nmap Script Attacks Categories

Lecture -10. Nmap Script scan

Lecture -9. Nmap Output Formats

Lecture -8. Nmap OS Detection

Lecture -7. Nmap Service Detection

Lecture -6. Nmap Port Scan and Techniques

Lecture -5. Nmap Target Selection and Techniques

Lecture -4. Nmap Scan Types and Techniques

Lecture -3. Installation of Tools & Lab Setup of NMAP

Thursday, October 15, 2020

Lecture -2. Ports and Protocols

Lecture -1. Introduction to NMAP

NMAP : 

Full form of nmap is network mapper which is used for Port & Network Scanning.

nmap is created by Gordon Lyon.

First Released in 1997 followed by better with each update.

Initially build for Linux, then ported to all other major distribution like windows, OS X and BSD.


NMAP HIGHLIGHTS :

1. Reliable Scanner.

2. Free & Open Source.

3. Enumerate, Scan, Vulnerability Analysis, Exploitation of Network Devices.

4. Powerful Nmap Scripting Engine.


WHO USES NMAP :

NMAP is the Tool for everyone.

Anyone who want to scan & detect vulnerabilities in own systems and target machine.

It is widely used by Penetration Testers, Network Administration & Security Auditor.


Legal Considerations :

The official documentation of Nmap has an amazing write-up about the legal issues involved with the port scanning, available at https://nmap.org/book/legal-issues.html


TCP IP and OSI Models

The TCP/IP model describes general guidelines for designing and implementing computer protocols.

OSI (Open Systems Interconnection) model was designed to be a reference model for describing the functions of a communication system.




TCP AND UDP :