![]() ZENMAP and NMAP are the same thing except ZENMAP provides you with a graphical user interface. After installing you will have NMAP and ZENMAP on your computer. NMAP works easily on both Windows and Linux. Step 1: Download NMAPĭownload nmap from and follow the installation instructions for your particular Operating System. Vuln: Use to find vulnerabilities on the targetįor this tutorial, I will show you how to scan a target for vulnerabilities, actively try and exploit any vulnerabilities, test whether the target is vulnerable to DoS, and then finally launch a DoS attack. Safe: Use to perform general network security scan that's less likely to alarm remote administrators Malware: Use to test target for presence of malware Intrusive: Use to perform more intense scans that pose a much higher risk of being detected by admins. The scripts cover the following categoriesĪuth: Use to test whether you can bypass authentication mechanismīroadcast: Use to find other hosts on the network and automatically add them to scanning que.ĭiscovery: Use to discover more about the network.ĭos: Use to test whether a target is vulnerable to DoSĮxploit: Use to actively exploit a vulnerabilityįuzzer: Use to test how server responds to unexpected or randomized fields in packets and determine other potential vulnerabilities NMAP version 7 comes equipped with a ton of new scripts you can use to do everything from DoSing targets to exploiting them (with written permission, of course). NMAP has always been an incredibly powerful tool, but with it's newest release, which dropped mid-November of last year, they've really out done themselves. Originally written by Gordon Lyon aka Fydor, it's used to locate hosts and services and create a map of the network. NMAP is an essential tool in any hacker's arsenal.
0 Comments
Leave a Reply. |