The Zenmap program is available for Windows, Linux, and Mac OS X. You can find the installation files for all operating systems on the Nmap website.
Depending on the intensity and target of your scan, running an Nmap scan may be against the terms of your internet service provider, and may land you in hot water. Always check your local laws and your ISP contract before performing Nmap scans on targets other than your own network.
Intense scan - A comprehensive scan. Contains Operating System (OS) detection, version detection, script scanning, traceroute, and has aggressive scan timing. This is considered an intrusive scan. Ping scan - This scan simply detects if the targets are online, it does not scan any ports. Quick scan - This is quicker than a regular scan due to aggressive timing and only scanning select ports. Regular scan - This is the standard Nmap scan without any modifiers. It will return ping and return open ports on the target.
Ports/Hosts - This tab will show the results of your port scan, including the services for those ports. Topology - This shows the traceroute for the scan you performed. You can see how many hops your data goes through to reach the target. Host Details - This shows a summary of your target learned through scans, such as the number of ports, IP addresses, hostnames, operating systems, and more. Scans - This tab stores the commands of your previously-run scans. This allows you to quickly re-scan with a specific set of parameters.
Linux - Download and install Nmap from your repository. Nmap is available through most of the major Linux repositories. Enter in the command below based on your distribution: Red Hat, Fedora, SUSErpm -vhU http://nmap. org/dist/nmap-6. 40-1. i386. rpm (32-bit) OR rpm -vhU http://nmap. org/dist/nmap-6. 40-1. x86_64. rpm (64-bit) Debian, Ubuntusudo apt-get install nmap Windows - Download the Nmap installer. This can be found for free from the developer’s website. It is highly recommended that you download directly from the developer to avoid any potential viruses or fake files. Using the installer allows you to quickly install the command line Nmap tools without having to worry about extracting to the right folder. If you don’t want the Zenmap graphical user interface, you can uncheck it during the installation process. Mac OS X – Download the Nmap disk image. This can be found for free from the developer’s website. It is highly recommended that you download directly from the developer to avoid any potential viruses or fake files. Use the included installer to install Nmap on your system. Nmap requires OS X 10. 6 or later.
Red Hat, Fedora, SUSErpm -vhU http://nmap. org/dist/nmap-6. 40-1. i386. rpm (32-bit) OR rpm -vhU http://nmap. org/dist/nmap-6. 40-1. x86_64. rpm (64-bit) Debian, Ubuntusudo apt-get install nmap
If you don’t want the Zenmap graphical user interface, you can uncheck it during the installation process.
Linux - Open the terminal if you are using a GUI for your Linux distribution. The location of the terminal varies by distribution Windows - This can be accessed by pressing the Windows key + R and then typing “cmd” into the Run field. Windows 8 users can press Windows key + X and select Command Prompt from the menu. You can run an Nmap scan from any directory. Mac OS X - Open the Terminal application located in the Utility subfolder of your Applications folder.
Depending on the intensity and target of your scan, running an Nmap scan may be against the terms of your internet service provider, and may land you in hot water. Always check your local laws and your ISP contract before performing Nmap scans on targets other than your own network.
-sS - This is a SYN stealth scan. It is less detectable than a standard scan, but may take longer. Many modern firewalls can detect an –sS scan. -sn - This is a ping scan. This will disable port scanning, and will only check to see if the host is online. -O - This is an operating system scan. The scan will attempt to determine the operating system of the target. -A - This variable enables several of the most commonly used scans: OS detection, version detection, script scanning, and traceroute. -F - This enables fast mode, and will reduce the number of ports scanned. -v - This will show more information in your results, making them easier to read.
The XML file will be saved to whatever your current working location is.
The XML file will be saved to whatever your current working location is.