Embed presentation
Downloaded 29 times







































Nmap is a network scanning tool that can perform port scanning, operating system detection, and version detection among other features. It works by sending TCP and UDP packets to a target machine and examining the response, comparing it to its database to determine open ports and operating system. There are different scanning techniques that can be used like TCP SYN scanning, UDP scanning, and OS detection. Nmap also includes a scripting engine that allows users to write scripts to automate networking tasks. The presentation concludes with demonstrating Nmap's features through some examples.






































Introduction to Nmap, basic information about the presenter and links to social profiles.
Outline of the presentation agenda including Features, How It Works, Scanning Techniques, and Demo.
A provocative question regarding the common belief that Nmap is just a port scanner.
Overview of Nmap features including OS and service fingerprinting, scan types, and enhancements since 1997.
Description of Nmap's operational process including packet sending, response examination, and how it's more than just informational.
Instructions on how to access help for Nmap with a focus on using the help command.
Transition to discussing various scanning techniques utilized by Nmap.
Command example using TCP connect scan with Nmap.
Command example demonstrating the FIN scanning technique.
Command example demonstrating the SYN scanning technique.
Command example displaying how to perform a UDP scan.
Command example for detecting service versions on a given IP.
Command example for performing operating system detection.
Example of using multiple advanced options in an Nmap command.
Introduction to NSE and its capabilities for scripting and automating tasks with Nmap.
Command example for locating NSE scripts.
Discussion on brute force techniques available using Nmap.
Insight into how Nmap can be used for vulnerability scanning.
Focus on using NSE scripts specifically for HTTP tasks.
Introduction to the demonstration part of the presentation.
Closing remarks and an invitation for any questions from the audience.