Tag Archives: nmap

Nmap enumerates remote machine open ports

Nmap lists open ports for remote machines
Nmap Scan Technology View Zenamp Scan Port NAMP Scan Port from the command line
Domain name resolution using the specified DNS server Target host alive or firewall enabled (-pn parameter) Scan specific port range (-p)

Nmap profile
Nmap (Network Mapper) is used to discover hosts and services on a computer network to create a “map” of the network. To achieve its goal, Nmap sends a specific packet to the target host and then analyzes the response. We can use Nmap to detect the server’s live and developed services, as well as to perform security audits on targets.
zenamp: Graphical interface version of Namp.
The principle of
Determine whether the command line entered by Nmap contains the domain name. If it contains the domain name, it needs to use the DNS server for domain name resolution, and then send ICMP Echo Request to detect the host’s existence. Nmap will retrieve the machine information including the port information based on the packet returned.
Port state

STATE (port)

explain

open

said port in the open STATE

closed

said port closed

filterd

said port in the filter can’t receive the returned the probe STATE

unfilterd

said port received back to the probe, but can’t confirm

opend/unfilterd

said port in the open or no filtering state

closed/unfilterd

said port in the closed or filtering state
NMAP scan technology to view
nmap-h / mark> >
SCAN TECHNIQUES are part of the SCAN TECHNIQUES. The following scanning techniques can be used to bypass certain filters in certain scenarios to achieve the purpose of detection. The parameters should be selected according to the actual situation.

Zenamp scans ports
Once Zenamp is open, enter the domain name or IP you want to probe into the target.

The namp scan port on the command line
Kali bring namp, nmap to use under Windows, the installation is successful in his folder exists after zenamp namp command line version exists, in the folder of CMD into namp enter namp. Exe followed by the domain name or IP address can scan, need to know the process of scanning can use the enter key when can get the current scanning progress.

Use the specified DNS server to resolve the domain name
The domain name is resolved to the IP address by the DNS server before the NMap probe. We can also use the specified DNS server for the resolution.

Nmap — DNS-Sever DNS server IP address to probe the domain name



8.8.8 is the Google domain name server.
when detecting some specific domain, because inside the company set up the DNS server, and resolve the IP address to the site, there might be Google’s DNS server does not contain the domain name and lead to can’t parse, where you need to change the DNS server to resolve the domain name
Target host alive or firewall enabled (-pn parameter)
When we already know that the host is alive or that the firewall is enabled, we can use the -pn parameter to stop probing previous ICMP requests. The purpose of not triggering firewall security mechanism has been reached.


Scan specific port range (-P)
-p m-n can be used to specify all ports in the port range between m and n.

[solved] DNET: failed to open device eth5

before the Windows of nmap were all good, today suddenly out of the problem, all kinds of reinstall can not be solved, do a night, finally solved, record the way

1, uninstall, reinstall the latest version of nmap, all default configuration go

2. Uninstall npcap

3. Install the latest version of npcap
https://nmap.org/npcap/#download

check the first one (the one related to nmap) to install

After

, you can normally use nmap

“DNET: failed to open device eth1” error resolution of nmap

0 x00: problems

to learn the use of the system nmap, run a simple command :

nmap -sC -p1- www.landgrey.cn

error: “dnet: Failed to open device eth1”
has not reported such a mistake before, I checked the data, found that it is likely to be related to winpcap drive .

0x01: resolution

and then downloaded
Win10Pcap 10.2.5002 Windows 32bit and 64bit Installer
after the installation, found the scanning process reported another error……

FATAL Bad Memory Block.
FATAL Bad Memory Block.
FATAL Bad Memory Block.
FATAL Bad Memory Block.
FATAL Bad Memory Block.
FATAL Bad Memory Block.
FATAL Bad Memory Block.
FATAL Bad Memory Block.
FATAL Bad Memory Block.
FATAL Bad Memory Block.
FATAL Bad Memory Block.
FATAL Bad Memory Block.
FATAL Bad Memory Block.
FATAL Bad Memory Block.
FATAL Bad Memory Block.

is installing two winpcap incompatible?Uninstall the old version of winpcap, and then uninstall after what seems to remind, also did not pay attention to, it automatically ignored ~
and then run again, found that I did not install winpcap, it seems that this Win10Pcap not ah, and then uninstall Win10Pcap, there is a reminder when uninstall, this time just think of carefully look, found is not found when uninstall

C:\Windows\SysWOW64\Packet.dll

find Packet. DLL changed to Packet. DLL. Bak… Nima, also do not know is the ghost that anti-virus software makes, after restoring original name, hint did not find

again

C:\Windows\SysWOW64\wpcap.dll

a check found that the name is also changed to wpcap.dll. Bak. After the recovery, the normal uninstall.
then go to the official website to download the latest version of wincap

After the

installation, run the original command and find that the problem has been resolved.

nmap – sT 192.168.0.184

Stats: 0:00:03 elapsed; 0 hosts completed (1 up), 1 undergoing Connect Scan
Connect Scan Timing: About 4.85% done; ETC: 16:22 (0:00:39 remaining)
Nmap scan report for 192.168.0.184
Host is up (0.00071s latency).
Not shown: 991 filtered ports
PORT    STATE SERVICE
25/tcp  open  smtp
110/tcp open  pop3
119/tcp open  nntp
143/tcp open  imap
465/tcp open  smtps
563/tcp open  snews
587/tcp open  submission
993/tcp open  imaps
995/tcp open  pop3s

0 x02: postscript

must not ignore some important tips to solve the problem in the process of solving the problem because of haste.
also do not know how DLL file into DLL. Bak file, fortunately did not give me delete ×_×