exploring nmap


While learning linux and networking, I am learning to tie in different streams of information through using tools like nmap. For example, I am becoming more familiar with creating a new terminal on my kali box using Ctl + Alt + F<key>, setting root permissions, then having nmap run an aggressive scan on nmap.org’s box, and piping the output to a file, like so:

nmap -A scanme.nmap.org > output.txt

Then, I can use vim to navigate around, using the / search tool and regexp to find different parameters. It helps to tie everything together.

This was a great resource for trying out different nmap commands.

Spinning up an instance of Metasploitable, and then using nmap to show all the open ports (hello ftp – I see you there at port 21!) then allowed me to practice some of the various nmap flags available.

By running the ‘ifconfig’ command, I was able to pull up the local IP address for the Metasploitable machine, and then run my kali box to explore its ports and such using nmap. This is just the tip of the iceberg – there are numerous other tools, including Wireshark, that I am learning to utilize.

Here was running ‘ifconfig’ on Metasploitable with IP 10.0.0.110

Then I jumped on my kali box to use nmap to explore the system at 10.0.0.110

$ nmap 10.0.0.110

Leave a comment