Nmap Tutorial: Scan for Vulnerabilities & Open Ports
Nmap is one of the most important tools in ethical hacking. It allows you to scan ports, find live devices, detect services, and check for vulnerabilities. This guide will walk you through how to use Nmap, even if you’re just starting out.
🔍 What Is Nmap?
Nmap (Network Mapper) is a free and open-source tool for scanning networks. It helps security researchers, system admins, and ethical hackers identify weaknesses in systems before attackers do.
🛠️ How to Install Nmap
- Linux:
sudo apt install nmap
- Windows: Download from nmap.org
- macOS:
brew install nmap
⚙️ Basic Nmap Command
nmap [options] [target]
This is the general format you’ll use when scanning a target.
🧪 Example 1: Scan a Host
nmap 192.168.1.1
This checks for open ports on a local IP address.
🔍 Example 2: Detect Services and Versions
nmap -sV example.com
This tells you which services are running and what versions.
🛡️ Example 3: Vulnerability Scan
nmap --script vuln target.com
This uses built-in scripts to check for known vulnerabilities.
📥 Save Results to File
nmap -oN result.txt target.com
Save your scan to a file for later review.
⚠️ Legal Notice
Always scan only your own systems or those you have permission to test. Unauthorized scanning is illegal. This tutorial is for educational purposes only.
💡 Nmap Pro Tips
- Use
-T4
to make your scan faster - Use
-A
for aggressive scanning (OS, services, scripts) - Use
nmap 192.168.1.0/24
to scan a full local network - Combine Nmap with tools like Nikto, Hydra, or Metasploit for deeper testing
✅ Final Thoughts
Nmap is a powerful tool that every ethical hacker should know. With just a few commands, you can reveal critical details about a network. Practice using Nmap on test machines, and always use it responsibly.
Written by darkriro | For educational purposes only. Stay safe, stay smart. 🛡️