![]() Network scanning is a serious security violation on many corporate networks. I refer to Zenmap specifically when addressing GUI features.Ī word of caution before you download and run Nmap or Zenmap on a network: Unless you are on the security team or an authorized network administrator, you should seek permission prior to running Nmap against your systems. In this article, I refer to Nmap and Zenmap interchangeably when referring to functionality, because it is really Nmap that is the underlying technology. Zenmap also makes it easy for you to compare scan results, search scan results, and filter hosts. Sure, it has some “canned” scans that you can select, but you can also enter Nmap commands with options into the Command field for full flexibility and enjoy every aspect of the command-line interface. Unlike some GUI tools, Zenmap is not a less flexible tool or less professional tool that is “dumbed down” for those who shun the command line. Nmap's complexity makes the Zenmap program extremely valuable for those who want to get started with security scanning without the long learning curve. Its primary focus is port scanning, but Nmap is so much more than a port scanner - it’s a complex security tool that helps you identify operating systems, application/service versions, and vulnerabilities on your network. Nmap, or Network Mapper, is the underlying software that is an extremely powerful tool for security auditing, network-attached device discovery, and security reconnaissance. It is a multi-platform, free open source application that provides users with an easy-to-use graphical user interface (GUI) for Nmap. Zenmap is the official Nmap Security Scanner GUI. If this page has helped you, please consider donating $1.00 to support the cost of hosting this site, thanks.Special Thanks: This article was made possible by support from Linux Professional Institute This page has gotten a little bit long, it's continued on at the Zenmap Intense Scan plus UDP page. For example, it would list the 3 scans that were done for the Topology scan: "192.168.19.54", "192.168.19.56" and "Home.Home". The Scans Tab (which isn't displayed here) lists the scans that were performed.The amount of details will change depending on the scanned device. The Host Details tab allows you to add comments to the scan for documentation purposes and other details about the host.You can also do multiple scans on different devices and it will display the ones with security issues in red. It is actually a powerful interactive image and you can click on the destination to find out more information. Topology tab will provide a look at the network and the path it took to the destination that was scanned.This is good to know if you are securing your server. The Ports/Hosts tab indicates which service is associated with each of the open ports.The open ports should be checked to see if they need to be open and/or if they should be open to the outside world. The Regular scan took 0.17 seconds to run and the Nmap Output tab shows the open TCP ports that were found. For a regular scan, you select "Regular scan" from the Profile selection list. ![]() The target IP address or domain name is the device that you want to scan.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |