OFFENSIVE SECURITY - PENETRATION TESTING - RED TEAMING - ETHICAL HACKING
The essential reconnaissance tool in every security professional's arsenal
Nmap (Network Mapper) is an open-source utility for network discovery and security auditing. Security professionals worldwide use it for network inventory, managing service upgrade schedules, and monitoring host or service uptime.
Scans the 1000 most common ports on the target host
Scans an entire subnet to discover active hosts
Enables OS detection, version detection, script scanning, and traceroute
Performs a TCP SYN scan, often used to bypass firewall logging
Scans all 65535 ports on the target system
Probes open ports to determine service/version info
NMAP offers various scan types to adapt to different network environments:
Open: Application is actively accepting connections
Closed: Port is accessible but no application is listening
Filtered: Firewall or filter prevents probes from reaching port
Fragment packets to evade packet filtering
Use a specific MTU size to fragment packets
Use decoy addresses to mask the origin of the scan
Add random data to packets to avoid pattern detection
Wireshark provides deep visibility into NMAP's network interaction, revealing scan techniques and target responses.
TCP SYN scan showing the characteristic half-open connections
Detect SYN packets without ACK (possible SYN scan)
Detect FIN packets without SYN/ACK (possible FIN scan)
Detect ICMP Echo requests (ping scan)
Ready to elevate your security posture?
Request A Cyber Security Assessment