Network Security Scanning with Nmap

February 5, 2018 | Views: 4876

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

 

Today we are going to scan a network for common publicly known Cybersecurity vulnerabilities with Nmap. As we all know Nmap is a very powerful tool when it comes to network scanning to find vulnerabilities in a network. It contains lot of scripts prebuilt for lot of task like for brute forcing a network login address and password for various type of protocols, discovering all directories  on a network , fuzzing and a lot of security auditing techniques are available in Nmap.

 

In this post I am going to scan my network for publicly known vulnerability to check if it’s vulnerable to any bug or not.

 

What you need to know 

This is a basic network scanning so I am going to describe everything that you need to know for doing a basic scan. Apart from this you can search about those vulnerabilities and way to mitigate them after the scan.

Prepare Nmap for the scan

STEP 1 To do this network scan you will need to clone in to a github URL, so type this in your terminal git clone https://github.com/vulnersCom/nmap-vulners.git and press enter. 

 


STEP 2 Now move to nmap-vulners directory and copy vulners.nse to your nmap/script directories as in this case my nmap script is located at /usr/share/namp/scripts so i am going to move vulners.nse to my nmap script directory, to do this type mv /root/Desktop/nmap-vulners/nmap-vulners.nse  /usr/share/nmap/scripts/ directory (you can also search your nmap script directory using locate nmap/script).

 

 

 

Start The Attack

To start the attack just type nmap –A –script vulners (your target) –vv.

 

 

 Command we used above

  -A : This is for aggressive mode, this will scan everything from OS scan ,version detection , traceroute to script scanning.

 

 –script : This tells nmap to run a script in this case its ‘vulners’.

 

-vv : This is for verbose mode so that we can see what’s going on in the program.

 

Detected vulnerabilities

As we can see above my network is affected with lot of common vulnerabilities with it’s description link of what type of vulnerabilities are these. I will not show how to exploit these bug because that is a different part which i will cover in some upcoming post.


So this was basic network scanning to find vulnerabilities in your network , we are going to cover more Nmap tutorial for network hacking so stay connected for more.

 

Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Ready to share your knowledge and expertise?
3 Comments
  1. Hi Shaquib,

    Thanks for the tutorial. So what is displayed is all the vulnerabilities scan by Nmap?

    ..thanks David

  2. Thanks for this, handy!
    There is a typo in the mv command – should be /vulners.nse (not /nmap-vulners.nse).

Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel