How do i use nmap to scan a service?



  • Man page for nmap

    Quote from the nmap man page:

    While Nmap is commonly used for security audits, many systems and network administrators find it useful for routine tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.

    To scan using a service.

    $ nmap -p http localhost
    Starting Nmap 7.70 ( https://nmap.org ) at 2018-03-12 10:26 BST
    Nmap scan report for localhost (127.0.0.1)
    Host is up (0.00059s latency).
    Other addresses for localhost (not scanned): ::1
    
    PORT     STATE  SERVICE
    80/tcp   closed http
    8008/tcp closed http
    
    Nmap done: 1 IP address (1 host up) scanned in 0.03 seconds
    

    You can also use wildcards to scan services.

    $ nmap -p http* localhost
    Starting Nmap 7.70 ( https://nmap.org ) at 2018-03-12 09:27 BST
    Nmap scan report for localhost (127.0.0.1)
    Host is up (0.00017s latency).
    Other addresses for localhost (not scanned): ::1
    
    PORT     STATE  SERVICE
    80/tcp   closed http
    280/tcp  closed http-mgmt
    443/tcp  closed https
    591/tcp  closed http-alt
    593/tcp  closed http-rpc-epmap
    4180/tcp closed httpx
    8000/tcp closed http-alt
    8008/tcp closed http
    8080/tcp closed http-proxy
    8443/tcp closed https-alt
    8990/tcp closed http-wmap
    8991/tcp closed https-wmap
    
    Nmap done: 1 IP address (1 host up) scanned in 0.03 seconds
    

 

© Lightnetics 2018