Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInEmail this to someone
NMAP for Windows: Download, Installation, Configuration and Top 30 Commands (2016 version)

Nmap has adopted to Windows quite a while ago. The Windows version allows the user to operate the tool via the graphical user interface, it also allows the users to send direct commands to the network scanner tool.

In this guide, we are going to take a look at how to download, install and configure the tool on your Windows operating system.

We will also provide a huge list that holds commands that might be usefull.

Download and Installation of NMAP for Windows

In order to install the tool on Windows, you will need to have the official package. The Windows package has been renamed to Zenmap. Zenmap is the cross platform name of the NMAP tool.

The official site were you can find the download is:

The direct location to download the Zenmap (NMAP) Network scanner:

Installation

  • Download the Zenmap executable from the official source
  • Double click on the downloaded Zenmap file
  • Follow the installation instructions that have been provided in the screen
  • Install additional software if the installer requests you to do so

Configuration of NMAP

NMAP for Windows: Download, Installation, Configuration and Top 30 Commands (2016 version)
nmap windows configuration

Zenmap does not need configuration at start. It is a plug-and-play tool that allows you to perform network scans within seconds.

If you have a desire to configure your tool to suite your demands, then I strongly advice you to take a look at the official documentation which you can find at the official nmap.org site.

NMAP / ZENMAP COMMANDS
Scan a single IP nmap 192.168.10.1
Scan a host nmap google.com
Scan a range of IPs nmap 192.168.10.1-20
Scan a subnet nmap 192.168.10.0/24
Scan targets from a text file nmap -iL list-of-ips.txt
Scan a single Port nmap -p 22 192.168.10.1
Scan a range of ports nmap -p 1-100 192.168.10.1
Scan 100 most common ports (Fast) nmap -F 192.168.10.1
Scan all 65535 ports nmap -p- 192.168.10.1
Scan using TCP connect nmap -sT 192.168.10.1
Scan using TCP SYN scan (default) nmap -sS 192.168.10.1
Scan UDP ports nmap -sU -p 123,161,162 192.168.10.1
Scan selected ports – ignore discovery nmap -Pn -F 192.168.10.1
Detect OS and Services nmap -A 192.168.10.1
Standard service detection nmap -sV 192.168.10.1
More aggressive Service Detection nmap -sV –version-intensity 5 192.168.10.1
Lighter banner grabbing detection nmap -sV –version-intensity 0 192.168.10.1
Save default output to file nmap -oN outputfile.txt 192.168.10.1
Save results as XML nmap -oX outputfile.xml 192.168.10.1
Save results in a format for grep nmap -oG outputfile.txt 192.168.10.1
Save in all formats nmap -oA outputfile 192.168.10.1
Scan using default safe scripts nmap -sV -sC 192.168.10.1
Get help for a script nmap –script-help=ssl-heartbleed
Scan using a specific NSE script nmap -sV -p 443 –script=ssl-heartbleed.nse 192.168.10.1
Scan with a set of scripts nmap -sV –script=smb* 192.168.10.1
Scan for UDP DDOS reflectors nmap –sU –A –PN –n –pU:19,53,123,161 –script=ntp-monlist,dns-recursion,snmp-sysdescr 192.168.10.0/24
Gather page titles from HTTP services nmap –script=http-title 192.168.10.0/24
Get HTTP headers of web services nmap –script=http-headers 192.168.10.0/24
Find web apps from known paths nmap –script=http-enum 192.168.10.0/24
Heartbleed Testing nmap -sV -p 443 –script=ssl-heartbleed 192.168.10.0/24
Find Information about IP address nmap –script=asn-query,whois,ip-geolocation-maxmind 192.168.10.0/24
Scan a host name with more info nmap -v mail.google.com

Source

Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInEmail this to someone
  • Learn more about eGRC Strategy, Products and Services click here
  • Learn more about Threat & Vulnerability Management Platforms click here
  • Learn more about Advanced End Point Protection click here
  • Learn more about NextGen Identity & Access Management Solutions click here