This project is all about exploring various features of the network scanning tool: Nmap, developed as part of the CSE-406 Computer Security Sessional. Nmap is mainly designed for network reconnaissance and security auditing.
Nmap excels at discovering hosts on a network. It utilizes various techniques such as ICMP echo requests, TCP handshake, and UDP discovery to identify live hosts.
The tool supports multiple port scanning techniques, including:
-
TCP Connect Scan: Establishes a full TCP connection to each port to determine if it's open.
-
SYN Stealth Scan: Utilizes SYN packets to determine open ports without completing the full connection.
-
UDP Scan: Scans for open UDP ports, important for services that use UDP for communication.
Nmap can detect the version of services running on open ports, providing valuable information for security assessments.
The tool incorporates OS detection capabilities, allowing users to identify the operating systems of target hosts.
An aggressive scan option (-A) enables a comprehensive scan by combining various scan types, service version detection, and operating system detection.
Nmap's scripting engine allows users to run custom scripts to automate tasks or gather more information during scans.
- Visit this link to get the complete documentation of Nmap.
- This video will come handy for the beginners
Nafis Karim
ID: 1805027
Profile
Saem Hasan
Lecturer, CSE, BUET
Profile