Hey guys! This is another post that is really helpful for those of you that are looking to identify a remote computer, and various things about it. Whether it is a victim computer you are profiling, or a hacker on your network, by the end of this tutorial, you should know your surroundings on the network a little bit better.
This is by no means an exhaustive list of commands, and in fact, these are quite basic. The reason for this is that there needs to be room for you to learn, and for me to rest between tutorials. If I gave you the codes for decoy scanning, you would go right to that without any concept of how NMAP works. Don’t be sour if you aren’t a super-hacker after this.
NMAP is a program that runs in the command line, or if you prefer with a GUI such as Zenmap. NMAP runs on many different operating systems, so this should not be an issue. Whether you are using the command line, or the GUI, you will still be able to enter these commands just how they are, and still achieve the desired effects.
NOTE: If you are running windows, you may need supplementary drivers that should come with the nmap package like the WinPcap libraries.
nmap -sS -O 192.168.0.1
OS Identifier w/ Verbosity
nmap -sS -O -v 192.168.0.1
OS Identifier w/ Extra Verbosity
nmap -sS -O -vv 192.168.0.1
nmap -PN 192.168.0.1
Scan For Open IP
nmap -sP 192.168.0.0/24
Bypass Some Packet Filters With Fragmentation
nmap -PN -f 192.168.0.1