How do i use nmap to scan a service?
-
Quote from the nmap man page:
While Nmap is commonly used for security audits, many systems and network administrators find it useful for routine tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.
To scan using a service.
$ nmap -p http localhost Starting Nmap 7.70 ( https://nmap.org ) at 2018-03-12 10:26 BST Nmap scan report for localhost (127.0.0.1) Host is up (0.00059s latency). Other addresses for localhost (not scanned): ::1 PORT STATE SERVICE 80/tcp closed http 8008/tcp closed http Nmap done: 1 IP address (1 host up) scanned in 0.03 seconds
You can also use wildcards to scan services.
$ nmap -p http* localhost Starting Nmap 7.70 ( https://nmap.org ) at 2018-03-12 09:27 BST Nmap scan report for localhost (127.0.0.1) Host is up (0.00017s latency). Other addresses for localhost (not scanned): ::1 PORT STATE SERVICE 80/tcp closed http 280/tcp closed http-mgmt 443/tcp closed https 591/tcp closed http-alt 593/tcp closed http-rpc-epmap 4180/tcp closed httpx 8000/tcp closed http-alt 8008/tcp closed http 8080/tcp closed http-proxy 8443/tcp closed https-alt 8990/tcp closed http-wmap 8991/tcp closed https-wmap Nmap done: 1 IP address (1 host up) scanned in 0.03 seconds
© Lightnetics 2024