{"id":2537,"date":"2025-03-30T08:24:07","date_gmt":"2025-03-30T08:24:07","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=2537"},"modified":"2025-03-30T08:24:07","modified_gmt":"2025-03-30T08:24:07","slug":"the-ultimate-nmap-guide-master-network-scanning-scripting-and-security-audits","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=2537","title":{"rendered":"The Ultimate Nmap Guide: Master Network Scanning, Scripting, and Security Audits"},"content":{"rendered":"<p><em>Hey guys, Rocky here!<\/em> \ud83d\udc4b<\/p>\n<p>Welcome to your ultimate guide to <strong>Nmap<\/strong>\u2014the Swiss Army knife of networking tools! Whether you\u2019re a cybersecurity newbie, a network admin, or just a curious techie, this tutorial will turn you into an Nmap ninja by the time we\u2019re done. Let\u2019s kick things off by answering the big question:<\/p>\n<h3 class=\"wp-block-heading\"><strong>What is Nmap?<\/strong><\/h3>\n<p>Nmap (short for <em>Network Mapper<\/em>) is a free, open-source tool used to <strong>discover devices<\/strong>, <strong>map networks<\/strong>, and <strong>audit security<\/strong> by scanning ports and services. Think of it as a supercharged flashlight that lets you peek into the darkest corners of any network. Developed by Gordon \u201cFyodor\u201d Lyon in 1997, it\u2019s now the go-to tool for hackers, IT pros, and even Hollywood movies (yep, it\u2019s <em>that<\/em> cool). <\/p>\n<p><strong>Pro Tip<\/strong>: If you\u2019re a visual learner, don\u2019t miss our\u00a0<strong>Nmap Basics Video Tutorial<\/strong>\u00a0where we break down the essentials in under 10 minutes! \ud83c\udfa5 <\/p>\n<p>\ud83d\udc49\u00a0<strong>Watch here<\/strong>:<\/p>\n<div class=\"wp-block-embed__wrapper\">\n<\/div>\n<h3 class=\"wp-block-heading\"><strong>Why Should You Care?<\/strong><\/h3>\n<p>\ud83d\udd75\ufe0f <strong>Discover Hidden Devices<\/strong>: Find every gadget connected to your network, from smart fridges to rogue routers.<\/p>\n<p>\ud83d\udee1\ufe0f <strong>Boost Security<\/strong>: Identify open ports, outdated services, and vulnerabilities before attackers do.<\/p>\n<p>\ud83d\udcca <strong>Network Audits<\/strong>: Keep your enterprise or home network organized and secure.<\/p>\n<p>\ud83d\ude80 <strong>Penetration Testing<\/strong>: Ethical hackers <em>live<\/em> by Nmap for red teaming and vulnerability assessments.<\/p>\n<h3 class=\"wp-block-heading\"><strong>But Wait\u2014Is Nmap Legal?<\/strong><\/h3>\n<p>Short answer: <strong>Yes<\/strong>, <em>if you use it ethically<\/em>. Always get <strong>explicit permission<\/strong> before scanning networks you don\u2019t own. Nmap\u2019s power comes with responsibility\u2014don\u2019t be <em>that person<\/em> who accidentally takes down a network or lands in legal trouble.<\/p>\n<p>In this guide, we\u2019ll cover everything from installing Nmap on your OS to running advanced stealth scans and scripting tricks. By the end, you\u2019ll be scanning networks like a pro, spotting risks, and hardening systems like a cybersecurity champ.<\/p>\n<p>Ready to dive in? Let\u2019s roll! \ud83d\ude80<\/p>\n<h2 class=\"wp-block-heading\">1. <strong>Basic Concepts of Network Scanning<\/strong><\/h2>\n<p>Before we dive into scanning like a pro, let\u2019s nail down the\u00a0<strong>core concepts<\/strong>\u00a0of network scanning.\u00a0<em>And guess what?<\/em>\u00a0We\u2019ll be using\u00a0<strong>Kali Linux<\/strong>\u00a0for all the demos here\u2014it\u2019s the ultimate playground for cybersecurity tools, and Nmap comes preinstalled! \ud83c\udfae\ud83d\udd0d (If you\u2019re new to Kali, don\u2019t sweat it\u2014we\u2019ll keep things simple!) <\/p>\n<p>\ud83d\udc49\u00a0<strong>Watch here<\/strong>: How to Install Kali Linux in 2025 \u2013 Step-by-Step Guide \ud83c\udfa5  <\/p>\n<div class=\"wp-block-embed__wrapper\">\n<\/div>\n<h3 class=\"wp-block-heading\">1.1 Understanding Networks and IP Addresses <\/h3>\n<p>At its core, a <strong>network<\/strong> is like a digital community where devices\u2014computers, smartphones, servers, routers, and even smart gadgets\u2014connect to share resources, exchange data, or communicate. Imagine a neighborhood where every house (device) has a unique address (IP address) and roads (cables or Wi-Fi signals) link them together. Without these addresses and connections, the internet as we know it wouldn\u2019t exist.<\/p>\n<p>An <strong>IP address<\/strong> (Internet Protocol address) is the cornerstone of this system. Think of it as a device\u2019s \u201chome address\u201d on a network. It\u2019s a string of numbers that identifies a device and allows others to locate and communicate with it. For example, 192.168.1.1 is a common IP address for a home router. There are two main versions of IP addresses:<\/p>\n<p><strong>IPv4<\/strong>: The classic format, using four numbers separated by dots (e.g., 192.168.1.1). Each number ranges from 0 to 255, creating about 4.3 billion possible addresses. But here\u2019s the catch\u2014we\u2019ve nearly run out of IPv4 addresses due to the explosion of internet-connected devices.<\/p>\n<p><strong>IPv6<\/strong>: The modern solution to IPv4\u2019s scarcity. It uses a longer format, like 2001:0db8:85a3:0000:0000:8a2e:0370:7334, offering trillions of trillions of addresses. While adoption is still growing, IPv6 ensures every device, sensor, or toaster can have its own unique IP.<\/p>\n<p>Networks are often divided into smaller segments called <strong>subnets<\/strong> (sub-networks) to improve efficiency and security. A subnet uses a <strong>CIDR notation<\/strong> (Classless Inter-Domain Routing) to define its range, such as 192.168.1.0\/24. The \/24 here means the first 24 bits of the IP address are fixed, allowing 256 possible addresses in that subnet (from 192.168.1.0 to 192.168.1.255). Subnetting helps organizations manage traffic, isolate devices, and reduce congestion\u2014like dividing a city into boroughs for better governance.<\/p>\n<p>Why does this matter for <strong>Nmap<\/strong>? When you scan a network, you\u2019re essentially knocking on doors (IP addresses) and checking which ones are \u201chome\u201d (active). Nmap uses IP addresses to target devices, identify open ports, and map the network\u2019s structure. Without understanding IPs and subnets, you\u2019d be wandering blindly in the digital wilderness.<\/p>\n<h3 class=\"wp-block-heading\"><strong>1.2 TCP vs. UDP Protocols<\/strong><\/h3>\n<p>To master network scanning with Nmap, you need to understand the two heavyweight protocols that govern how data travels across networks: <strong>TCP<\/strong> and <strong>UDP<\/strong>. These protocols are the backbone of internet communication, but they work in fundamentally different ways\u2014and Nmap leverages both to uncover network secrets.<\/p>\n<h4 class=\"wp-block-heading\"><strong>TCP: The Reliable Perfectionis<\/strong><\/h4>\n<p><strong>TCP (Transmission Control Protocol)<\/strong> is like a meticulous postal service that guarantees delivery. It\u2019s <em>connection-oriented<\/em>, meaning it establishes a formal handshake between devices before sending data. Here\u2019s how it works:<\/p>\n<p><strong>Three-Way Handshake<\/strong>:<\/p>\n<p>Your device sends a <strong>SYN<\/strong> (synchronize) packet to a server.<\/p>\n<p>The server replies with a <strong>SYN-ACK<\/strong> (synchronize-acknowledge).<\/p>\n<p>Your device sends a final <strong>ACK<\/strong> (acknowledge) to confirm the connection.<br \/>Only then does data transfer begin.<\/p>\n<p><strong>Reliability<\/strong>:<\/p>\n<p>TCP ensures data arrives intact. If a packet gets lost, it\u2019s resent.<\/p>\n<p>Used for tasks where accuracy is critical: web browsing (HTTP\/HTTPS), emails (SMTP), and file transfers (FTP).<\/p>\n<p><strong>Overhead<\/strong>:<\/p>\n<p>All that reliability comes at a cost. TCP is slower due to its error-checking and acknowledgment processes.<\/p>\n<h4 class=\"wp-block-heading\"><strong>UDP: The Speedy Daredevil<\/strong><\/h4>\n<p><strong>UDP (User Datagram Protocol)<\/strong> is the polar opposite. It\u2019s <em>connectionless<\/em>\u2014no handshakes, no guarantees. Think of it as tossing a message in a bottle into the ocean and hoping it reaches its destination.<\/p>\n<p><strong>No Frills, No Delays<\/strong>:<\/p>\n<p>Devices send data without establishing a connection.<\/p>\n<p>No retries if packets get lost.<\/p>\n<p><strong>Speed Over Accuracy<\/strong>:<\/p>\n<p>Ideal for real-time applications where speed matters more than perfection: video streaming (e.g., Zoom, YouTube), online gaming, and DNS queries.<\/p>\n<p><strong>Lightweight<\/strong>:<\/p>\n<p>Minimal overhead makes UDP faster but riskier.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Why Does This Matter for Nmap?<\/strong><\/h4>\n<p>Nmap uses these protocols to probe networks in different ways:<\/p>\n<p><strong>TCP Scans<\/strong>:<\/p>\n<p>Perfect for discovering open ports running web servers, databases, or SSH.<\/p>\n<p>Example: nmap -sS 192.168.1.1 (SYN scan\u2014fast and stealthy).<\/p>\n<p><strong>UDP Scans<\/strong>:<\/p>\n<p>Critical for finding services like DNS (port 53) or SNMP (port 161).<\/p>\n<p>Example: nmap -sU 192.168.1.1 (slower but essential for UDP services).<\/p>\n<h4 class=\"wp-block-heading\"><strong>TCP vs. UDP Cheat Sheet<\/strong><\/h4>\n<p><strong>Pro Tip<\/strong>: Firewalls often treat TCP and UDP traffic differently. For example, they might block TCP ports but leave UDP ports wide open. Always scan both to paint a complete picture of your target! <\/p>\n<h3 class=\"wp-block-heading\"><strong>1.3 Ports and Port States (Open, Closed, Filtered)<\/strong><\/h3>\n<p>In the world of networking, <strong>ports<\/strong> act as virtual gateways that enable devices to communicate with specific services or applications. Imagine a bustling apartment building: each apartment (port) has a unique number, and behind each door lies a different service\u2014like a web server, email client, or database. Ports range from <strong>0 to 65535<\/strong>, and understanding their states\u2014<strong>open<\/strong>, <strong>closed<\/strong>, or <strong>filtered<\/strong>\u2014is crucial for mapping networks and assessing security risks.<\/p>\n<p>Ports are logical endpoints assigned to services to organize network traffic. They ensure data reaches the correct application, much like a postal code directs mail to the right address. Ports are divided into three categories:<\/p>\n<p><strong>Well-known ports (0-1023)<\/strong>: Reserved for critical system services (e.g., HTTP on port 80, HTTPS on 443, SSH on 22).<\/p>\n<p><strong>Registered ports (1024-49151)<\/strong>: Used by user-installed applications (e.g., Microsoft SQL Server on 1433).<\/p>\n<p><strong>Dynamic\/Ephemeral ports (49152-65535)<\/strong>: Temporary ports assigned to client devices during interactions (e.g., your laptop using a random port to fetch a webpage).<\/p>\n<h4 class=\"wp-block-heading\"><strong>Port States Explained<\/strong><\/h4>\n<p>When Nmap scans a port, it categorizes the result into one of three states:<\/p>\n<p><strong>Open<\/strong><\/p>\n<p>An <strong>open port<\/strong> means a service is actively listening for connections. For example, if port 80 is open, the device likely hosts a web server.<\/p>\n<p><em>Why it matters<\/em>: Open ports are gateways for legitimate traffic but also prime targets for attackers. Unnecessary open ports can expose vulnerabilities (e.g., an outdated FTP server on port 21).<\/p>\n<p><strong>Closed<\/strong><\/p>\n<p>A <strong>closed port<\/strong> has no service listening, but the host itself is reachable. Think of it as an unlocked door leading to an empty room.<\/p>\n<p><em>Why it matters<\/em>: Closed ports indicate the host is active but not offering a specific service. They\u2019re less risky but still useful for network mapping.<\/p>\n<p><strong>Filtered<\/strong><\/p>\n<p>A <strong>filtered port<\/strong> means Nmap can\u2019t determine if it\u2019s open or closed due to interference from firewalls, intrusion detection systems (IDS), or network rules. Packets are dropped or blocked, leaving Nmap in the dark.<\/p>\n<p><em>Why it matters<\/em>: Filtered ports suggest security measures are in place, but they can also hide critical vulnerabilities. Skilled attackers use advanced techniques to bypass filtering.<\/p>\n<h4 class=\"wp-block-heading\"><strong>How Nmap Detects Port States<\/strong><\/h4>\n<p>Nmap sends carefully crafted probes (TCP SYN packets, UDP datagrams, etc.) to target ports and analyzes the responses:<\/p>\n<p><strong>Open port<\/strong>: Receives a SYN-ACK (for TCP) or a service-specific reply (for UDP).<\/p>\n<p><strong>Closed port<\/strong>: Receives a RST (reset) packet for TCP or an ICMP error for UDP.<\/p>\n<p><strong>Filtered port<\/strong>: Gets no response or an ambiguous reply (e.g., ICMP unreachable errors).<\/p>\n<h4 class=\"wp-block-heading\"><strong>Why Port States Matter for Security<\/strong><\/h4>\n<p>Identifying open and filtered ports is the backbone of <strong>vulnerability assessment<\/strong>. For instance:<\/p>\n<p>An open port 3389 (Remote Desktop Protocol) could allow unauthorized access if poorly secured.<\/p>\n<p>A filtered port 22 (SSH) might indicate a firewall rule hiding a sensitive server.<\/p>\n<p>By cataloging port states, Nmap helps you:<\/p>\n<p>Harden unnecessary services (close open ports).<\/p>\n<p>Audit firewall rules (investigate filtered ports).<\/p>\n<p>Detect unauthorized devices (e.g., a rogue IoT gadget with unexpected open ports).<\/p>\n<p><strong>Pro Tip<\/strong>: On Kali Linux, run nmap -F &lt;target&gt; for a fast scan of the 100 most common ports. Combine this with -v (verbose) to see real-time port state updates! <\/p>\n<h3 class=\"wp-block-heading\"><strong>1.4 Host Discovery Techniques<\/strong><\/h3>\n<p>Before scanning ports or probing services, Nmap needs to answer a critical question: <em>\u201c<strong>Which devices are actually alive on the network?<\/strong>\u201d<\/em> This process, called <strong>host discovery<\/strong>, helps you avoid wasting time scanning dead IP addresses and focus on active targets. Let\u2019s break down how Nmap pulls this off\u2014and why it\u2019s a game-changer for efficiency.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Why Host Discovery Matter<\/strong><\/h4>\n<p>Imagine trying to call every phone number in a city to find active lines\u2014it\u2019s tedious and impractical. Host discovery works similarly:<\/p>\n<p>Saves time by skipping inactive IPs.<\/p>\n<p>Reduces network noise (fewer packets = less chance of triggering alarms).<\/p>\n<p>Essential for mapping large networks (e.g., corporate subnets with hundreds of devices).<\/p>\n<h4 class=\"wp-block-heading\"><strong>How Nmap Discovers Hosts<\/strong><\/h4>\n<p>Nmap uses a mix of probes and clever tricks to detect live hosts. Here are the most common techniques:<\/p>\n<p><strong>ICMP Echo Request (Ping Scan)<\/strong><\/p>\n<p>The classic \u201cping\u201d method: sends an ICMP Echo Request packet to a target.<\/p>\n<p>If the host replies with an ICMP Echo Reply, it\u2019s marked as <strong>alive<\/strong>.<\/p>\n<p><em>Limitation<\/em>: Many networks block ICMP for \u201csecurity through obscurity.\u201d<\/p>\n<p><strong>ARP Scan (Local Networks Only)<\/strong><\/p>\n<p>On <strong>local networks<\/strong> (e.g., your home Wi-Fi), Nmap uses ARP (Address Resolution Protocol) to find devices.<\/p>\n<p>ARP translates IP addresses to MAC addresses (e.g., 192.168.1.1 \u2192 AA:BB:CC:DD:EE:FF).<\/p>\n<p><em>Why it\u2019s gold<\/em>: ARP scans are blazing fast and bypass most firewalls since ARP is fundamental to LAN operations.<\/p>\n<p><strong>TCP SYN Ping<\/strong><\/p>\n<p>Sends a TCP SYN packet to a port (default: 80 or 443).<\/p>\n<p>If the host responds with SYN-ACK, it\u2019s alive. No full connection is established, making it stealthy.<\/p>\n<p><em>Example<\/em>: nmap -sn -PS80 192.168.1.0\/24<\/p>\n<p><strong>UDP Ping<\/strong><\/p>\n<p>Sends a UDP packet to a port (e.g., DNS port 53).<\/p>\n<p>If the host responds with an ICMP \u201cport unreachable\u201d error, it\u2019s alive.<\/p>\n<p><em>Use case<\/em>: Detecting hosts that ignore TCP but respond to UDP.<\/p>\n<p><strong>Reverse-DNS Lookup<\/strong><\/p>\n<p>Checks if an IP has a DNS (Domain Name) record.<\/p>\n<p>A valid DNS name often indicates an active device.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Host Discovery in Action<\/strong><\/h4>\n<p><strong>Command<\/strong>: <\/p>\n<p> nmap -sn 192.168.1.0\/24<\/p>\n<p>The -sn flag tells Nmap to skip port scanning and focus on host discovery.<\/p>\n<p><strong>Output<\/strong>: A list of live IPs, MAC addresses (for local networks), and hostnames.<\/p>\n<p><strong>Example Output<\/strong>:<\/p>\n<p>Nmap scan report for 192.168.1.1<br \/>\nHost is up (0.002s latency).<br \/>\nMAC Address: AA:BB:CC:DD:EE:FF (RouterManufacturer)  <\/p>\n<h4 class=\"wp-block-heading\"><strong>Host Discovery Cheat Sheet<\/strong><\/h4>\n<h4 class=\"wp-block-heading\"><strong>Pro Tips for Kali Linux Users<\/strong><\/h4>\n<p><strong>Local Networks<\/strong>: ARP scans are automatic in Kali. Just run nmap -sn 192.168.1.0\/24 to map your LAN.<\/p>\n<p><strong>External Networks<\/strong>: Combine TCP SYN pings (-PS) and UDP pings (-PU) to bypass firewalls.<\/p>\n<p><strong>Stealth Mode<\/strong>: Use -T2 (polite timing) to avoid overwhelming targets.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Why Skip Host Discovery?<\/strong><\/h4>\n<p>Sometimes you <em>know<\/em> a host is up (e.g., a web server). Use -Pn to force Nmap to scan all targets, even if they appear dead. This is handy for:<\/p>\n<p>Penetration testing (avoiding detection by skipping noisy pings).<\/p>\n<p>Scanning targets behind strict firewalls that block discovery probes. <\/p>\n<h2 class=\"wp-block-heading\"><strong>2. Basic Nmap Commands and Scans<\/strong> <\/h2>\n<p>Let\u2019s roll up our sleeves and run some\u00a0<strong>real Nmap scans<\/strong>\u00a0on the\u00a0<strong>Metasploitable 2<\/strong>\u00a0machine (IP:\u00a0192.168.147.131). This vulnerable VM is perfect for testing\u2014it\u2019s packed with open ports and outdated services.\u00a0<em>I\u2019ll include command examples and sample outputs below, but don\u2019t forget to check the attached images for visual guides!<\/em> <\/p>\n<h3 class=\"wp-block-heading\"><strong>2. 1. Simple Ping Scan (nmap -sn)<\/strong><\/h3>\n<p>\ud83d\udc4b Let\u2019s kick off your hands-on Nmap journey with the <strong>Simple Ping Scan<\/strong>, the go-to command for answering one critical question: <em>\u201c<strong>Is this device alive on the network?<\/strong>\u201d<\/em><\/p>\n<h4 class=\"wp-block-heading\"><strong>What Does nmap -sn Do?<\/strong><\/h4>\n<p>The -sn flag tells Nmap to skip port scanning and focus solely on <strong>host discovery<\/strong>. It sends a mix of probes to determine if a target is online, including:<\/p>\n<p><strong>ICMP Echo Requests<\/strong> (classic \u201cping\u201d packets).<\/p>\n<p><strong>ARP Requests<\/strong> (for devices on your local network).<\/p>\n<p><strong>TCP SYN Probes<\/strong> (to common ports like 80 or 443).<\/p>\n<p><strong>UDP Probes<\/strong> (to check for UDP-responsive hosts).<\/p>\n<p>This scan is <strong>fast<\/strong>, <strong>stealthy<\/strong>, and perfect for mapping networks without triggering too many alarms.<\/p>\n<h4 class=\"wp-block-heading\"><strong>When to Use a Ping Scan<\/strong><\/h4>\n<p>Inventory your home or office network.<\/p>\n<p>Verify if a server or device is online before deeper scanning.<\/p>\n<p>Avoid unnecessary port scans on inactive hosts.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Step-by-Step Demo on Metasploitable 2<\/strong><\/h4>\n<p><strong>Target IP<\/strong>: 192.168.147.131<\/p>\n<h4 class=\"wp-block-heading\"><strong>Command<\/strong>:<\/h4>\n<p>nmap -sn 192.168.147.131<\/p>\n<h3 class=\"wp-block-heading\"><strong>What Happens Behind the Scenes<\/strong>:<\/h3>\n<p><strong>On Local Networks<\/strong>:<\/p>\n<p>Kali Linux sends an <strong>ARP request<\/strong> to the target\u2019s MAC address.<\/p>\n<p>If Metasploitable 2 responds, it\u2019s marked as \u201calive.\u201d<\/p>\n<p><strong>On Remote Networks<\/strong>:<\/p>\n<p>Nmap sends <strong>ICMP pings<\/strong> and <strong>TCP SYN packets<\/strong> to gauge responsiveness.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Sample Output<\/strong>: <\/h4>\n<h4 class=\"wp-block-heading\"><strong>Scanning an Entire Subnet<\/strong><\/h4>\n<p>Want to map <em>all<\/em> devices on your local network? Use a <strong>CIDR range<\/strong> (e.g., \/24 for 256 IPs):<\/p>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap -sn 192.168.147.0\/24<\/p>\n<p><strong>Output<\/strong>:<\/p>\n<h4 class=\"wp-block-heading\"><strong>Why It\u2019s Not Always Perfect<\/strong><\/h4>\n<p><strong>Firewalls\/IDS<\/strong>: May block ICMP or SYN packets, causing false \u201cdown\u201d results.<\/p>\n<p><strong>ARP Limitations<\/strong>: Only works on local networks.<\/p>\n<p><strong>No Port Data<\/strong>: This scan doesn\u2019t tell you <em>what\u2019s running<\/em>\u2014just <em>what\u2019s alive<\/em>.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Pro Tips<\/strong><\/h4>\n<p><strong>Bypass ICMP Blocks<\/strong>: Force TCP or UDP probes with flags like PS80 (TCP port 80) or PU53 (UDP port 53). nmap -sn -PS80 192.168.147.131<\/p>\n<p><strong>Speed<\/strong>: Use T4 for faster scans on reliable networks.<\/p>\n<p><strong>Ethics<\/strong>: Always get permission\u2014even a ping scan can look suspicious!<\/p>\n<h4 class=\"wp-block-heading\"><strong>Common Questions<\/strong><\/h4>\n<p><strong>Q: Why does Nmap say \u201cHost seems down\u201d even if the device is online?<\/strong><\/p>\n<p>A: The target might block all discovery probes. Use -Pn to assume it\u2019s up and scan ports anyway.<\/p>\n<p><strong>Q: Can I ping scan IPv6 addresses?<\/strong><\/p>\n<p>A: Yes! Use -6:<\/p>\n<p>nmap -6 -sn fe80::20c:29ff:feXX:XXXX<\/p>\n<p><strong>Lab Time<\/strong>: Try running nmap -sn on your local network and share how many devices you find in the comments! \ud83d\udd75\ufe0f\u2642\ufe0f<\/p>\n<h3 class=\"wp-block-heading\"><strong>2.2 Basic Port Scan (nmap [target])<\/strong><\/h3>\n<p> Now that you\u2019ve confirmed your target is alive, it\u2019s time to dig deeper with a <strong>Basic Port Scan<\/strong>. This is where Nmap shines\u2014it checks the <strong>1,000 most common ports<\/strong> to reveal what services are running, what\u2019s vulnerable, and where to focus your security efforts. Let\u2019s break it down using our Metasploitable 2 lab machine (IP: 192.168.147.131).<\/p>\n<h4 class=\"wp-block-heading\"><strong>What Does nmap [target] Do?<\/strong><\/h4>\n<p>This default scan answers three key questions:<\/p>\n<p><strong>Which ports are open?<\/strong> (e.g., port 80 for HTTP, port 22 for SSH).<\/p>\n<p><strong>What services are running?<\/strong> (e.g., Apache 2.2.8, OpenSSH 4.7).<\/p>\n<p><strong>What\u2019s the device\u2019s operating system?<\/strong> (Nmap makes educated guesses based on network behavior).<\/p>\n<h4 class=\"wp-block-heading\"><strong>Step-by-Step Demo<\/strong><\/h4>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap 192.168.147.131<\/p>\n<p><strong>What Happens<\/strong>:<\/p>\n<p>Nmap scans the <strong>top 1,000 ports<\/strong> (from a list of common services like HTTP, FTP, SSH, etc.).<\/p>\n<p>It sends probes (TCP SYN packets) to each port and analyzes responses to determine if they\u2019re <strong>open<\/strong>, <strong>closed<\/strong>, or <strong>filtered<\/strong>.<\/p>\n<p>It attempts <strong>service version detection<\/strong> to identify software running on open ports.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Sample Output<\/strong><\/h4>\n<h4 class=\"wp-block-heading\"><strong>Key Takeaways from the Output<\/strong><\/h4>\n<p><strong>Open Ports<\/strong>:<\/p>\n<p><strong>Port 21<\/strong>: FTP server (vsftpd 2.3.4)\u2014a <em>notoriously vulnerable version<\/em>.<\/p>\n<p><strong>Port 22<\/strong>: SSH server (OpenSSH 4.7)\u2014outdated and potentially risky.<\/p>\n<p><strong>Port 80<\/strong>: Apache web server\u2014check for misconfigurations or old software.<\/p>\n<p><strong>Closed Ports<\/strong>: 977 ports had no listening services (e.g., port 111 in this example).<\/p>\n<p><strong>Service Versions<\/strong>: Critical for spotting vulnerabilities (e.g., vsftpd 2.3.4 is linked to a backdoor exploit).<\/p>\n<h4 class=\"wp-block-heading\"><strong>Why Use a Basic Port Scan?<\/strong><\/h4>\n<p><strong>Quick Recon<\/strong>: Fast way to identify low-hanging fruit for security audits.<\/p>\n<p><strong>Prioritize Risks<\/strong>: Focus on open ports running outdated or exploitable services.<\/p>\n<p><strong>Foundation for Advanced Scans<\/strong>: Use results to plan targeted scans (e.g., sV for deeper version detection).<\/p>\n<h4 class=\"wp-block-heading\"><strong>Pro Tips<\/strong><\/h4>\n<p><strong>Speed vs. Accuracy<\/strong>:<\/p>\n<p>Use T4 for faster scans: nmap -T4 192.168.147.131.<\/p>\n<p>Use sV for detailed service versions: nmap -sV 192.168.147.131.<\/p>\n<p><strong>Filter Noise<\/strong>:<\/p>\n<p>Hide closed ports with -open: nmap &#8211;open 192.168.147.131<\/p>\n<p><strong>Save Results<\/strong>: Export to a file for later analysis: nmap -oN scan_results.txt 192.168.147.131<\/p>\n<h4 class=\"wp-block-heading\"><strong>Common Questions<\/strong><\/h4>\n<p><strong>Q: Why are only 1,000 ports scanned by default?<\/strong><\/p>\n<p>A: It\u2019s a balance between speed and coverage. Most services run on common ports (e.g., 80, 443, 22). Use -p- to scan all 65,535 ports (but this takes <em>much<\/em> longer).<\/p>\n<p><strong>Q: Why does Nmap show \u201cfiltered\u201d ports?<\/strong><\/p>\n<p>A: Firewalls or routers are blocking Nmap\u2019s probes. Use advanced techniques like -sS (SYN scan) or -A (aggressive scan) to bypass them.<\/p>\n<p><strong>Q: Can I scan multiple targets at once?<\/strong><\/p>\n<p>A: Yes! Separate IPs with spaces:<\/p>\n<p>nmap 192.168.147.131 192.168.147.132<\/p>\n<p>Metasploitable 2 is <em>designed to be insecure<\/em>, so your scan will reveal <strong>dozens of open ports<\/strong>. This makes it a perfect lab to practice:<\/p>\n<p>Exploiting FTP on port 21.<\/p>\n<p>Testing SSH vulnerabilities on port 22.<\/p>\n<p>Auditing the Apache web server on port 80.<\/p>\n<p><strong>Lab Time<\/strong>: Run a basic port scan on your local router or another lab device. How many open ports did you find? Share below! \ud83d\udd0d <\/p>\n<h3 class=\"wp-block-heading\"><strong>2.3 Scanning Multiple Targets<\/strong><\/h3>\n<p>Ready to level up from single-target scans? Let\u2019s tackle <strong>scanning multiple targets<\/strong>\u2014a must-have skill for mapping entire networks, auditing enterprise environments, or testing a fleet of servers. Whether you\u2019re working with IP ranges, lists, or entire subnets, Nmap makes it easy. <\/p>\n<h4 class=\"wp-block-heading\"><strong>Why Scan Multiple Targets?<\/strong><\/h4>\n<p><strong>Network Inventory<\/strong>: Discover all devices on your LAN (e.g., smart TVs, printers, servers).<\/p>\n<p><strong>Security Audits<\/strong>: Identify vulnerabilities across multiple systems at once.<\/p>\n<p><strong>Efficiency<\/strong>: Save time by scanning dozens (or hundreds) of IPs in one command.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Methods to Scan Multiple Targets<\/strong><\/h4>\n<h5 class=\"wp-block-heading\"><strong>1. Scan a Range of IPs<\/strong><\/h5>\n<p>Use a hyphen (-) to define a sequential range of IP addresses.<\/p>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap 192.168.147.1-10<\/p>\n<p><strong>What It Does<\/strong>:<\/p>\n<p>Scans IPs from 192.168.147.1 to 192.168.147.10.<\/p>\n<p>Perfect for small, targeted batches.<\/p>\n<p><strong>Sample Output<\/strong>:<\/p>\n<p>Nmap scan report for 192.168.147.1<br \/>\nHost is up (0.001s latency).<br \/>\nNot shown: 998 closed ports<br \/>\nPORT   STATE SERVICE<br \/>\n80\/tcp open  http<\/p>\n<p>Nmap scan report for 192.168.147.131<br \/>\nHost is up (0.002s latency).<br \/>\nPORT     STATE SERVICE<br \/>\n21\/tcp   open ftp<br \/>\n22\/tcp   open ssh<br \/>\n&#8230;<\/p>\n<h5 class=\"wp-block-heading\"><strong>2. Scan a Subnet (CIDR Notation)<\/strong><\/h5>\n<p>Use \/24 (or another CIDR) to scan all IPs in a subnet.<\/p>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap 192.168.147.0\/24<\/p>\n<p><strong>What It Does<\/strong>:<\/p>\n<p>Scans all 256 IPs in the 192.168.147.* range.<\/p>\n<p><em>Pro Tip<\/em>: Add sn for a fast ping sweep: nmap -sn 192.168.147.0\/24<\/p>\n<p><strong>Sample Output<\/strong>:<\/p>\n<p>Nmap scan report for 192.168.147.1<br \/>\nHost is up (0.001s latency).<br \/>\nMAC Address: AA:BB:CC:DD:EE:FF (RouterBrand)<\/p>\n<p>Nmap scan report for 192.168.147.131<br \/>\nHost is up (0.002s latency).<br \/>\nMAC Address: 00:0C:29:XX:XX:XX (VMware)<br \/>\n&#8230;<\/p>\n<h5 class=\"wp-block-heading\"><strong>3. Scan from a List of IPs<\/strong><\/h5>\n<p>Use the -iL flag to load targets from a text file.<\/p>\n<p><strong>Step 1<\/strong>: Create a file targets.txt:<\/p>\n<p>192.168.147.1<br \/>\n192.168.147.131<br \/>\n192.168.147.200<\/p>\n<p><strong>Step 2<\/strong>: Run the scan:<\/p>\n<p>nmap -iL targets.txt<\/p>\n<p><strong>What It Does<\/strong>:<\/p>\n<p>Scans all IPs listed in targets.txt.<\/p>\n<p>Ideal for pre-defined targets (e.g., critical servers).<\/p>\n<h4 class=\"wp-block-heading\"><strong>Advanced Multi-Target Scans<\/strong><\/h4>\n<p>Combine flags for precision:<\/p>\n<h4 class=\"wp-block-heading\"><strong>Scan Specific Ports Across Multiple IPs<\/strong><\/h4>\n<p>nmap -p 80,443 192.168.147.1-10<\/p>\n<p>Checks ports 80 (HTTP) and 443 (HTTPS) on IPs 1-10.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Aggressive Scan on a Subnet<\/strong><\/h4>\n<p>nmap -A -T4 192.168.147.0\/24<\/p>\n<p>A: Enables OS detection, version detection, and script scanning.<\/p>\n<p>T4: Faster scan (trade speed for stealth).<\/p>\n<h3 class=\"wp-block-heading\"><strong>Real-World Example: Metasploitable Lab<\/strong><\/h3>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap -p 21,22,80 192.168.147.1-20<\/p>\n<p><strong>Goal<\/strong>:<\/p>\n<p>Find FTP (21), SSH (22), and HTTP (80) services in the first 20 IPs.<\/p>\n<p>Metasploitable 2 (192.168.147.131) will show open ports, while others may be closed or filtered. <\/p>\n<h3 class=\"wp-block-heading\"><strong>Common Issues &amp; Fixes<\/strong><\/h3>\n<p><strong>Scan Too Slow?<\/strong><\/p>\n<p>Limit ports: p 21,22,80.<\/p>\n<p>Use timing templates: T4 (fast) or T5 (insane, use with caution).<\/p>\n<p><strong>Too Noisy?<\/strong><\/p>\n<p>Add -max-rate 100 to limit packets per second.<\/p>\n<p><strong>Permission Denied?<\/strong><\/p>\n<p>Run Nmap as root\/sudo: sudo nmap &#8230;.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Pro Tips<\/strong><\/h4>\n<p><strong>Ethics First<\/strong>: Always get permission before scanning large networks.<\/p>\n<p><strong>Output Management<\/strong>: Save results to separate files for analysis: nmap -oN scan_results.txt -iL targets.txt<\/p>\n<p><strong>Exclude Hosts<\/strong>: Skip specific IPs with -exclude: nmap 192.168.147.0\/24 &#8211;exclude 192.168.147.1<\/p>\n<p><strong>Lab Challenge<\/strong>: Run a scan on your local subnet (192.168.1.0\/24 or similar). How many devices did you find? Share your results below! \ud83d\udd0d <\/p>\n<h3 class=\"wp-block-heading\"><strong>2.4. Specifying Port Ranges (p)<\/strong><\/h3>\n<p>Want to avoid scanning all 65,535 ports and focus only on what matters? The <strong>-p<\/strong> flag is your scalpel for surgical precision. Whether you\u2019re targeting a single port, a custom range, or the most critical services, this command lets you cut through the noise.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Why Specify Port Ranges?<\/strong><\/h4>\n<p><strong>Speed<\/strong>: Scanning fewer ports = faster results.<\/p>\n<p><strong>Stealth<\/strong>: Fewer packets = less chance of triggering alerts.<\/p>\n<p><strong>Focus<\/strong>: Target high-value ports (e.g., web servers, databases) for security audits.<\/p>\n<h4 class=\"wp-block-heading\"><strong>How to Use the p Flag<\/strong><\/h4>\n<h4 class=\"wp-block-heading\"><strong>1. Scan a Single Port<\/strong><\/h4>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap -p 80 192.168.147.131<\/p>\n<p><strong>What It Does<\/strong>:<\/p>\n<p>Checks only <strong>port 80<\/strong> (HTTP) for activity.<\/p>\n<p><em>Use case<\/em>: Verify if a web server is running.<\/p>\n<p><strong>Sample Output<\/strong>:<\/p>\n<p>PORT   STATE SERVICE<br \/>\n80\/tcp open http<\/p>\n<h4 class=\"wp-block-heading\"><strong>2. Scan a Range of Ports<\/strong><\/h4>\n<p>Use a hyphen (-) to define a sequential range.<\/p>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap -p 1-100 192.168.147.131<\/p>\n<p><strong>What It Does<\/strong>:<\/p>\n<p>Scans ports <strong>1 to 100<\/strong> (common for system services like FTP, SSH, and Telnet).<\/p>\n<p><em>Pro Tip<\/em>: Combine with sV to detect service versions: nmap -p 1-100 -sV 192.168.147.131<\/p>\n<p><strong>Sample Output<\/strong>:<\/p>\n<p>PORT   STATE SERVICE     VERSION<br \/>\n21\/tcp open ftp         vsftpd 2.3.4<br \/>\n22\/tcp open ssh         OpenSSH 4.7p1<br \/>\n23\/tcp open telnet      Linux telnetd<br \/>\n&#8230;<\/p>\n<h4 class=\"wp-block-heading\"><strong>3. Scan Multiple Ports\/Ranges<\/strong><\/h4>\n<p>Separate ports\/ranges with commas (,).<\/p>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap -p 21,22,80-100,443 192.168.147.131<\/p>\n<p><strong>What It Does<\/strong>:<\/p>\n<p>Targets <strong>FTP (21)<\/strong>, <strong>SSH (22)<\/strong>, <strong>HTTP (80-100)<\/strong>, and <strong>HTTPS (443)<\/strong>.<\/p>\n<p><em>Use case<\/em>: Focus on common attack vectors.<\/p>\n<h4 class=\"wp-block-heading\"><strong>4. Scan Top N Ports<\/strong><\/h4>\n<p>Use &#8211;top-ports to scan the most frequently used ports.<\/p>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap &#8211;top-ports 10 192.168.147.131<\/p>\n<p><strong>What It Does<\/strong>:<\/p>\n<p>Scans the <strong>10 most common ports<\/strong> (e.g., 80, 443, 22, 21).<\/p>\n<p><em>Pro Tip<\/em>: Combine with sV for version detection.<\/p>\n<h4 class=\"wp-block-heading\"><strong>5. Scan All Ports<\/strong><\/h4>\n<p><strong>Warning<\/strong>: This is slow and noisy! Use sparingly.<\/p>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap -p- 192.168.147.131<\/p>\n<p><strong>What It Does<\/strong>:<\/p>\n<p>Scans all <strong>65,535 ports<\/strong> (takes 30+ minutes for a single host).<\/p>\n<p><em>Use case<\/em>: Comprehensive penetration testing.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Metasploitable 2 Lab Demo<\/strong><\/h4>\n<p>Let\u2019s hunt for high-risk services on our vulnerable VM:<\/p>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap -p 21,22,80,3306,5900 192.168.147.131<\/p>\n<p><strong>Expected Results<\/strong>:<\/p>\n<p><strong>Port 21<\/strong>: Vulnerable FTP server (vsftpd 2.3.4).<\/p>\n<p><strong>Port 22<\/strong>: Outdated OpenSSH.<\/p>\n<p><strong>Port 80<\/strong>: Apache web server (check for misconfigurations).<\/p>\n<p><strong>Port 3306<\/strong>: MySQL database (default credentials: root:toor).<\/p>\n<p><strong>Port 5900<\/strong>: VNC server (often unsecured).<\/p>\n<h4 class=\"wp-block-heading\"><strong>Pro Tips<\/strong><\/h4>\n<p><strong>Exclude Ports<\/strong>: Use -exclude-ports to skip unwanted ports. nmap -p 1-1000 &#8211;exclude-ports 80,443 192.168.147.131<\/p>\n<p><strong>UDP Ports<\/strong>: Scan UDP services with sU (e.g., DNS on port 53): nmap -sU -p 53,161 192.168.147.131<\/p>\n<p><strong>Port Lists<\/strong>: Save custom port lists in a file and load them with p $(cat ports.txt).<\/p>\n<h4 class=\"wp-block-heading\"><strong>Common Mistakes<\/strong><\/h4>\n<p><strong>Syntax Errors<\/strong>: Use commas for multiple ports, hyphens for ranges.<\/p>\n<p>\u2705 p 21,22,80-100<\/p>\n<p>\u274c p 21-22-80<\/p>\n<p><strong>Over-Scanning<\/strong>: Avoid p- unless absolutely necessary\u2014it\u2019s loud and slow.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Why This Matters for Security<\/strong><\/h4>\n<p><strong>Targeted Attacks<\/strong>: Hackers often focus on specific ports (e.g., 445 for SMB exploits).<\/p>\n<p><strong>Compliance<\/strong>: Auditors check for unnecessary open ports (e.g., Telnet on port 23).<\/p>\n<p><strong>Resource Management<\/strong>: Reduce server load by closing unused ports.<\/p>\n<p><strong>Lab Challenge<\/strong>: Run a scan on ports 21-30 of your local router. What\u2019s open? Share your findings below! \ud83d\udd0d <\/p>\n<h3 class=\"wp-block-heading\">2.<strong>5. Verbose Output (v) and Debugging (d)<\/strong><\/h3>\n<p>\ud83d\udc4b Ever run an Nmap scan and thought, <em>\u201cWhat\u2019s actually happening behind the scenes?\u201d<\/em> The <strong>-v (verbose)<\/strong> and <strong>-d (debug)<\/strong> flags pull back the curtain, giving you real-time insights and troubleshooting superpowers. <\/p>\n<h4 class=\"wp-block-heading\"><strong>Verbose Mode (v)<\/strong><\/h4>\n<p><strong>Purpose<\/strong>: Get <strong>real-time updates<\/strong> and <strong>detailed logs<\/strong> during your scan.<\/p>\n<h4 class=\"wp-block-heading\"><strong>When to Use<\/strong>:<\/h4>\n<p>Track scan progress (e.g., how many ports are left).<\/p>\n<p>See resolved hostnames, open ports, and service detection in real time.<\/p>\n<p>Identify delays or unexpected behavior.<\/p>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap -v 192.168.147.131<\/p>\n<p><strong>Sample Output<\/strong>:<\/p>\n<p>Starting Nmap 7.94 ( &lt;https:\/\/nmap.org&gt; )<br \/>\nInitiating ARP Ping Scan at 15:30<br \/>\nScanning 192.168.147.131 [1 port]<br \/>\nCompleted ARP Ping Scan at 15:30 (0.01s)<br \/>\nInitiating Parallel DNS resolution of 1 host.<br \/>\nCompleted Parallel DNS resolution of 1 host. (0.01s)<br \/>\nInitiating SYN Stealth Scan at 15:30<br \/>\nScanning 192.168.147.131 [1000 ports]<br \/>\nDiscovered open port 21\/tcp on 192.168.147.131<br \/>\nDiscovered open port 22\/tcp on 192.168.147.131<br \/>\n&#8230;<\/p>\n<p><strong>Key Features<\/strong>:<\/p>\n<p>Shows timing and phases (e.g., ARP scan, DNS resolution, port scanning).<\/p>\n<p>Lists open ports as they\u2019re discovered.<\/p>\n<p>Use vv for <em>extra verbosity<\/em> (even more details).<\/p>\n<h4 class=\"wp-block-heading\"><strong>Debug Mode (d)<\/strong><\/h4>\n<p><strong>Purpose<\/strong>: Get <strong>technical logs<\/strong> for troubleshooting failed scans or errors.<\/p>\n<h5 class=\"wp-block-heading\"><strong>When to Use<\/strong>:<\/h5>\n<p>Diagnose why a scan hangs or crashes.<\/p>\n<p>Understand packet-level interactions (e.g., blocked probes, strange responses).<\/p>\n<p>Report bugs to the Nmap team.<\/p>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap -d 192.168.147.131<\/p>\n<p><strong>Sample Output<\/strong>:<\/p>\n<p>[DEBUG] Packet capture details: enp0s3 (up), MTU 1500, IPv4<br \/>\n[DEBUG] Sending ARP ping to 192.168.147.131<br \/>\n[DEBUG] Received ARP response: 00:0C:29:XX:XX:XX<br \/>\n[DEBUG] Sending SYN probe to port 21 (tcp)<br \/>\n[DEBUG] Received SYN\/ACK from 192.168.147.131:21<br \/>\n&#8230;<\/p>\n<p><strong>Key Features<\/strong>:<\/p>\n<p>Displays raw packet data and timing details.<\/p>\n<p>Logs interactions with firewalls or IDS.<\/p>\n<p>Use d3 or higher (up to d9) for <em>extreme debugging<\/em> (developer-level logs).<\/p>\n<h4 class=\"wp-block-heading\"><strong>Combining Verbose and Debug (v -d)<\/strong><\/h4>\n<p>For <strong>maximum visibility<\/strong>, stack these flags:<\/p>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap -v -d 192.168.147.131<\/p>\n<p><strong>What You\u2019ll See<\/strong>:<\/p>\n<p>Real-time progress updates <em>and<\/em> technical logs.<\/p>\n<p>Perfect for diagnosing complex network issues.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Real-World Example: Hanging Scan<\/strong><\/h4>\n<p><strong>Scenario<\/strong>: Your scan freezes at 90%.<\/p>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap -v -d 192.168.147.131<\/p>\n<p><strong>Diagnosis<\/strong>:<\/p>\n<p>Debug logs might reveal a firewall dropping packets or a misconfigured router.<\/p>\n<p>Verbose logs show which phase is stuck (e.g., port 443 timing out).<\/p>\n<p><strong>Fix<\/strong>:<\/p>\n<p>Adjust timing (T4).<\/p>\n<p>Skip problematic ports (-exclude-ports 443).<\/p>\n<h4 class=\"wp-block-heading\"><strong>Pro Tips<\/strong><\/h4>\n<p><strong>Save Logs<\/strong>: Export verbose\/debug output to a file: nmap -v -d -oN scan_log.txt 192.168.147.131<\/p>\n<p><strong>Filter Noise<\/strong>: Use grep to search logs for keywords like \u201copen\u201d or \u201cerror\u201d: cat scan_log.txt | grep &#8220;open port&#8221;<\/p>\n<p><strong>Stealth Trade-Off<\/strong>: Verbose\/debug modes increase scan noise\u2014avoid them in sensitive environments.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Common Debugging Scenarios<\/strong><\/h4>\n<p><strong>\u201cHost Appears Down\u201d<\/strong>:<\/p>\n<p>Check logs for blocked ICMP\/ARP probes.<\/p>\n<p>Use Pn to skip host discovery and force port scanning.<\/p>\n<p><strong>Slow Scans<\/strong>:<\/p>\n<p>Debug logs show delays in probe responses.<\/p>\n<p>Fix: Adjust timing template (T4) or reduce parallel probes (-min-parallelism 10).<\/p>\n<p><strong>Firewall Interference<\/strong>:<\/p>\n<p>Logs reveal dropped packets or RST (reset) responses.<\/p>\n<p>Fix: Use stealth scans (sS) or fragment packets (f).<\/p>\n<h4 class=\"wp-block-heading\"><strong>Metasploitable 2 Demo<\/strong><\/h4>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap -v -d -p 21,22,80 192.168.147.131<\/p>\n<p><strong>What You\u2019ll Learn<\/strong>:<\/p>\n<p>How Nmap interacts with FTP, SSH, and HTTP ports.<\/p>\n<p>How services respond to SYN probes.<\/p>\n<p>How to interpret timing and packet details.<\/p>\n<p><strong>Lab Challenge<\/strong>: Run a verbose scan on your router (nmap -v [router-IP]). How many ports are open? Share your logs! <\/p>\n<h2 class=\"wp-block-heading\"><strong>3. Nmap Scripting Engine (NSE)<\/strong><\/h2>\n<p> Hold onto your terminals\u2014this is where Nmap transforms from a simple scanner into a <strong>hacker\u2019s multitool<\/strong>. The <strong>Nmap Scripting Engine (NSE)<\/strong> lets you automate tasks, exploit vulnerabilities, and dig deeper into networks using pre-built or custom scripts. Let\u2019s crack open this treasure chest and see how it supercharges your scans!<\/p>\n<h4 class=\"wp-block-heading\"><strong>What is the NSE?<\/strong><\/h4>\n<p>The NSE is a Lua-based framework that extends Nmap\u2019s capabilities. It comes bundled with <strong>600+ scripts<\/strong> (and growing!) to:<\/p>\n<p><strong>Automate Recon<\/strong>: Enumerate services, extract banners, or brute-force logins.<\/p>\n<p><strong>Detect Vulnerabilities<\/strong>: Check for flaws like Heartbleed, Shellshock, or outdated software.<\/p>\n<p><strong>Interact with Protocols<\/strong>: Probe databases, APIs, IoT devices, or industrial systems.<\/p>\n<h3 class=\"wp-block-heading\"><strong>NSE Script Categories<\/strong><\/h3>\n<p>Scripts are organized by purpose. Key categories include:<\/p>\n<h4 class=\"wp-block-heading\"><strong>How to Use NSE Scripts<\/strong><\/h4>\n<h5 class=\"wp-block-heading\"><strong>Basic Syntax<\/strong><\/h5>\n<p>nmap &#8211;script &lt;script-name&gt; &lt;target&gt;<\/p>\n<h6 class=\"wp-block-heading\"><strong>Examples<\/strong><\/h6>\n<p><strong>Run a Single Script<\/strong>: nmap &#8211;script http-enum 192.168.147.131<\/p>\n<p>Scans for common web directories (e.g., \/admin, \/login).<\/p>\n<p><strong>Run a Category<\/strong>: nmap &#8211;script vuln 192.168.147.131<\/p>\n<p>Checks for <em>all vulnerabilities<\/em> in the vuln category.<\/p>\n<p><strong>Run Multiple Scripts<\/strong>: nmap &#8211;script http-enum,ftp-anon 192.168.147.131<\/p>\n<p>Combines HTTP directory enumeration and FTP anonymous login checks.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Popular Scripts in Action<\/strong><\/h4>\n<h5 class=\"wp-block-heading\"><strong>1. HTTP Enumeration (http-enum)<\/strong><\/h5>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap &#8211;script http-enum -p 80 192.168.147.131<\/p>\n<p><strong>Output<\/strong>:<\/p>\n<p>PORT   STATE SERVICE<br \/>\n80\/tcp open  http<br \/>\n| http-enum:<br \/>\n|   \/admin\/: Possible admin dashboard<br \/>\n|   \/backup\/: Backup files<br \/>\n|   \/logs\/: Log directory<\/p>\n<h5 class=\"wp-block-heading\"><strong>2. FTP Brute-Force (ftp-brute)<\/strong><\/h5>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap &#8211;script ftp-brute &#8211;script-args userdb=users.txt,passdb=passwords.txt 192.168.147.131<\/p>\n<p><strong>Output<\/strong>:<\/p>\n<p>PORT   STATE SERVICE<br \/>\n21\/tcp open  ftp<br \/>\n| ftp-brute:<br \/>\n|   Valid credentials:<br \/>\n|     Username: admin   Password: password123<\/p>\n<h5 class=\"wp-block-heading\"><strong>3. Vulnerability Detection (http-sql-injection)<\/strong><\/h5>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap &#8211;script http-sql-injection -p 80 192.168.147.131<\/p>\n<p><strong>Output<\/strong>:<\/p>\n<p>PORT   STATE SERVICE<br \/>\n80\/tcp open  http<br \/>\n| http-sql-injection:<br \/>\n|   Possible SQLI at &lt;http:\/\/192.168.147.131\/search?query=1&gt;&#8217;<\/p>\n<h4 class=\"wp-block-heading\"><strong>Custom Scripts &amp; Arguments<\/strong><\/h4>\n<p><strong>Load Custom Scripts<\/strong>: nmap &#8211;script \/path\/to\/custom-script.nse 192.168.147.131<\/p>\n<p><strong>Pass Script Arguments<\/strong>: nmap &#8211;script http-enum &#8211;script-args http-enum.displayall=true 192.168.147.131<\/p>\n<h4 class=\"wp-block-heading\"><strong>NSE Best Practices<\/strong><\/h4>\n<p><strong>Start Safe<\/strong>: Use -script=safe to avoid accidental damage.<\/p>\n<p><strong>Test Locally<\/strong>: Run intrusive scripts on your lab (e.g., Metasploitable 2) first.<\/p>\n<p><strong>Stay Legal<\/strong>: Brute-force scripts can lock accounts\u2014always get permission!<\/p>\n<p><strong>Update Regularly<\/strong>: Pull the latest scripts with sudo nmap &#8211;script-updatedb.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Real-World Metasploitable 2 Demo<\/strong><\/h4>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap &#8211;script vuln -p 21,80 192.168.147.131<\/p>\n<p><strong>Expected Findings<\/strong>:<\/p>\n<p><strong>Port 21<\/strong>: vsftpd 2.3.4 backdoor vulnerability.<\/p>\n<p><strong>Port 80<\/strong>: Outdated Apache with potential exploits.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Troubleshooting NSE<\/strong><\/h4>\n<p><strong>Script Not Working?<\/strong> Check dependencies (e.g., Python libraries for certain scripts).<\/p>\n<p><strong>Timeout Issues<\/strong>: Increase timeout with -script-timeout 2m.<\/p>\n<p><strong>Debug Scripts<\/strong>: Add d to see Lua errors.<\/p>\n<p><strong>Lab Time<\/strong>: Run nmap &#8211;script ssh-hostkey 192.168.147.131. What\u2019s the SSH key fingerprint? Share your findings! <\/p>\n<h2 class=\"wp-block-heading\"><strong>4. Output Formats and Reporting<\/strong><\/h2>\n<p>Scanning a network is just half the battle\u2014<strong>organizing and interpreting results<\/strong> is where the real magic happens. Whether you\u2019re writing a security report, sharing findings with your team, or automating analysis, Nmap\u2019s output formats have you covered. Let\u2019s break down how to save, parse, and present your scans like a pro!<\/p>\n<h3 class=\"wp-block-heading\"><strong>Nmap Output Formats<\/strong><\/h3>\n<p>Nmap supports multiple formats to suit different needs:<\/p>\n<h4 class=\"wp-block-heading\"><strong>1. Normal Output (oN)<\/strong><\/h4>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap -p 80,443 -oN scan_results.txt 192.168.147.131<\/p>\n<p><strong>Sample Output<\/strong>:<\/p>\n<p># Nmap 7.94 scan initiated Wed Jan 1 12:00:00 2024<br \/>\nNmap scan report for 192.168.147.131<br \/>\nHost is up (0.001s latency).<\/p>\n<p>PORT    STATE SERVICE<br \/>\n80\/tcp  open  http<br \/>\n443\/tcp open  https<\/p>\n<p><strong>Best For<\/strong>: Quick reviews or sharing raw results with non-technical teams.<\/p>\n<h4 class=\"wp-block-heading\"><strong>2. XML Output (oX)<\/strong><\/h4>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap -p 21,22 -oX scan_results.xml 192.168.147.131<\/p>\n<p><strong>Sample Output<\/strong>:<\/p>\n<p>&lt;?xml version=&#8221;1.0&#8243; encoding=&#8221;UTF-8&#8243;?&gt;<br \/>\n&lt;nmaprun scanner=&#8221;nmap&#8221; args=&#8221;nmap -p 21,22 -oX scan_results.xml 192.168.147.131&#8243;&gt;<br \/>\n  &lt;host&gt;<br \/>\n    &lt;address addr=&#8221;192.168.147.131&#8243; addrtype=&#8221;ipv4&#8243;\/&gt;<br \/>\n    &lt;ports&gt;<br \/>\n      &lt;port protocol=&#8221;tcp&#8221; portid=&#8221;21&#8243;&gt;<br \/>\n        &lt;state state=&#8221;open&#8221; reason=&#8221;syn-ack&#8221;\/&gt;<br \/>\n        &lt;service name=&#8221;ftp&#8221; product=&#8221;vsftpd 2.3.4&#8243;\/&gt;<br \/>\n      &lt;\/port&gt;<br \/>\n    &lt;\/ports&gt;<br \/>\n  &lt;\/host&gt;<br \/>\n&lt;\/nmaprun&gt;<\/p>\n<p><strong>Best For<\/strong>:<\/p>\n<p>Importing into tools like <strong>Metasploit<\/strong>, <strong>Nessus<\/strong>, or custom scripts.<\/p>\n<p>Generating HTML\/PDF reports (e.g., with xsltproc).<\/p>\n<h4 class=\"wp-block-heading\"><strong>3. Grepable Output (oG)<\/strong><\/h4>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap -p 80 -oG scan_results.grep 192.168.147.131<\/p>\n<p><strong>Sample Output<\/strong>:<\/p>\n<p>Host: 192.168.147.131 ()<br \/>\nPorts: 80\/open\/tcp\/\/http\/\/\/<\/p>\n<p><strong>Best For<\/strong>:<\/p>\n<p>Parsing with grep, awk, or Python\/PowerShell scripts.<\/p>\n<p>Example: Extract open ports: grep &#8220;open&#8221; scan_results.grep | awk &#8216;{print $5}&#8217;<\/p>\n<h4 class=\"wp-block-heading\"><strong>4. Saving All Formats (oA)<\/strong><\/h4>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap -p 1-100 -oA full_scan 192.168.147.131<\/p>\n<p>Creates three files: full_scan.nmap, full_scan.xml, full_scan.gnmap.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Generating Professional Reports<\/strong><\/h4>\n<h5 class=\"wp-block-heading\"><strong>XML to HTML with xsltproc<\/strong><\/h5>\n<p>Convert XML to a readable HTML report: xsltproc scan_results.xml -o report.html<\/p>\n<p>Open report.html in a browser for a clean, visual layout.<\/p>\n<h5 class=\"wp-block-heading\"><strong>Using Tools like Zenmap<\/strong><\/h5>\n<p>Nmap\u2019s GUI (<strong>Zenmap<\/strong>) generates interactive topology maps and saves scans in all formats:<\/p>\n<p><strong>Z<\/strong><\/p>\n<h5 class=\"wp-block-heading\"><strong>Analyzing Scan Results<\/strong><\/h5>\n<p><strong>Prioritize Risks<\/strong>: Focus on open ports with outdated services (e.g., vsftpd 2.3.4).<\/p>\n<p><strong>Compare Scans<\/strong>: Use ndiff to track changes over time: ndiff scan1.xml scan2.xml<\/p>\n<p><strong>Automate Alerts<\/strong>: Write scripts to flag unexpected open ports (e.g., port 22 on a non-server device).<\/p>\n<h4 class=\"wp-block-heading\"><strong>Real-World Example: Metasploitable 2 Report<\/strong><\/h4>\n<p><strong>Command<\/strong>:<\/p>\n<p>nmap -A -p- -oX metasploitable_scan.xml 192.168.147.131<\/p>\n<p><strong>Steps<\/strong>:<\/p>\n<p>Run the scan with OS detection (O), version detection (sV), and aggressive scripts (A).<\/p>\n<p>Generate an HTML report: xsltproc metasploitable_scan.xml -o report.html<\/p>\n<p>Share report.html with your team to highlight vulnerabilities like FTP backdoors or outdated Apache.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Pro Tips<\/strong><\/h4>\n<p><strong>Ethical Reporting<\/strong>: Always anonymize sensitive IPs\/hostnames before sharing externally.<\/p>\n<p><strong>Automation<\/strong>: Schedule scans and auto-generate reports with cron jobs or CI\/CD pipelines.<\/p>\n<p><strong>Tool Integration<\/strong>: Pipe Nmap XML into tools like <strong>Elasticsearch<\/strong> or <strong>Splunk<\/strong> for dashboards.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Common Issues &amp; Fixes<\/strong><\/h4>\n<p><strong>Permission Denied<\/strong>: Use sudo when saving files to restricted directories.<\/p>\n<p><strong>Empty Output<\/strong>: Ensure the target IP is correct and reachable.<\/p>\n<p><strong>Unreadable XML<\/strong>: Validate with nmap -d -v -oX scan.xml to catch errors.<\/p>\n<p><strong>Lab Challenge<\/strong>: Run a scan on your local machine, save it as XML, and convert it to HTML. What vulnerabilities did you find? Share your report!<\/p>\n<h2 class=\"wp-block-heading\">Nmap commands<\/h2>\n<p>This table is by no means exhaustive, but it should cover most of the main commands and techniques you\u2019ll use with Nmap. For a complete list of options and how to use them, refer to the official Nmap documentation. <\/p>\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h2>\n<p>Nmap is more than just a port scanner\u2014it\u2019s a powerhouse for uncovering the hidden layers of any network. From mapping devices and detecting vulnerabilities to automating tasks with the Nmap Scripting Engine (NSE), this tool equips you with the skills to secure systems, troubleshoot issues, and think like a cybersecurity professional. Whether you\u2019re a network admin hardening infrastructure, a penetration tester probing for weaknesses, or a curious learner exploring the digital world, Nmap\u2019s versatility makes it an indispensable ally.<\/p>\n<p>Throughout this guide, we\u2019ve journeyed from the fundamentals of IP addresses and protocols and script-driven exploitation. Using Metasploitable 2 as our lab, we\u2019ve seen firsthand how open ports and outdated services create gateways for attackers\u2014and how Nmap\u2019s insights can turn those risks into actionable fixes. But with great power comes great responsibility: always prioritize ethics, obtain proper permissions, and use your skills to build safer systems, not exploit them.<\/p>\n<p>As networks grow more complex, the need for robust security practices has never been greater. Nmap\u2019s continuous development and passionate community ensure it stays ahead of emerging threats, making it a future-proof tool in your arsenal. So keep experimenting in controlled labs, dive into scripting, and stay curious. The world of cybersecurity is vast, but with Nmap in your toolkit, you\u2019re already miles ahead.<\/p>\n<p>Ready to take the next step? Revisit your scans, tweak your commands, and challenge yourself to uncover something new. The network is your canvas\u2014paint it secure. <\/p>\n<h2 class=\"wp-block-heading\"><strong>Frequently Asked Questions (FAQs) <\/strong><\/h2>\n<h3 class=\"wp-block-heading\"><strong>1. Is Nmap Illegal to Use?<\/strong><\/h3>\n<p><strong>Answer<\/strong>:<\/p>\n<p>Nmap itself is <strong>100% legal software<\/strong>, but how you use it matters. Scanning networks <em>without explicit permission<\/em> is illegal in many jurisdictions. Always:<\/p>\n<p>Get written consent before scanning networks you don\u2019t own.<\/p>\n<p>Use it ethically (e.g., testing your own systems, authorized penetration tests).<\/p>\n<p>Avoid scanning public infrastructure (e.g., government websites).<\/p>\n<h3 class=\"wp-block-heading\"><strong>2. Can Nmap Crash a Network or Device?<\/strong><\/h3>\n<p><strong>Answer<\/strong>:<\/p>\n<p>Nmap is designed to be safe, but poorly configured scans <em>can<\/em> cause issues:<\/p>\n<p><strong>Aggressive timing<\/strong> (T5) might overwhelm fragile devices (e.g., IoT gadgets).<\/p>\n<p><strong>UDP scans<\/strong> (sU) on sensitive services (e.g., DNS) could trigger crashes.<\/p>\n<p><strong>Best Practice<\/strong>: Start with T3 timing and test in lab environments first.<\/p>\n<h3 class=\"wp-block-heading\"><strong>3. What\u2019s the Difference Between TCP and UDP Scans?<\/strong><\/h3>\n<p><strong>Answer<\/strong>:<\/p>\n<p><strong>TCP Scans<\/strong> (e.g., sS, sT): Target connection-oriented services (HTTP, SSH). Faster and more common.<\/p>\n<p><strong>UDP Scans<\/strong> (sU): Target connectionless services (DNS, SNMP). Slower because UDP lacks built-in responses.<\/p>\n<p><strong>Pro Tip<\/strong>: Always run UDP scans for critical services like DNS (port 53).<\/p>\n<h3 class=\"wp-block-heading\"><strong>4. How Do I Avoid Detection by Firewalls or IDS?<\/strong><\/h3>\n<p><strong>Answer<\/strong>: Use stealth techniques, but <em>only with permission<\/em>:<\/p>\n<p><strong>Stealth Scans<\/strong>: sS (SYN scan) avoids full TCP connections.<\/p>\n<p><strong>Decoys<\/strong>: D RND:5 hides your IP among decoys.<\/p>\n<p><strong>Fragmentation<\/strong>: f splits packets to evade detection.<\/p>\n<p><strong>Timing<\/strong>: Slow scans (T2) reduce suspicion.<\/p>\n<h3 class=\"wp-block-heading\"><strong>5. Why Are Some Ports Marked as Filtered?<\/strong><\/h3>\n<p><strong>Answer<\/strong>:<\/p>\n<p>A <strong>filtered port<\/strong> means a firewall, router, or IDS is blocking Nmap\u2019s probes. You can\u2019t tell if the port is open or closed. To troubleshoot:<\/p>\n<p>Use sS (SYN scan) or sT (TCP connect scan).<\/p>\n<p>Try -reason to see why a port was labeled filtered.<\/p>\n<h3 class=\"wp-block-heading\"><strong>6. How Do I Scan IPv6 Addresses?<\/strong><\/h3>\n<p><strong>Answer<\/strong>: Use the -6 flag:<\/p>\n<p>nmap -6 2001:db8::1<\/p>\n<p>Ensure your network and target support IPv6.<\/p>\n<p>Combine with other flags (e.g., sS -6 for a stealth IPv6 scan).<\/p>\n<h3 class=\"wp-block-heading\"><strong>7. What Does \u201cHost Seems Down\u201d Mean, and How Do I Fix It?<\/strong><\/h3>\n<p><strong>Answer<\/strong>:<\/p>\n<p>Nmap\u2019s host discovery failed. Solutions:<\/p>\n<p><strong>Bypass Discovery<\/strong>: Use Pn to scan all ports (assumes the host is up).<\/p>\n<p><strong>Adjust Probes<\/strong>: Try PS80,443 (TCP SYN pings to ports 80\/443).<\/p>\n<p><strong>Check Connectivity<\/strong>: Ensure the target is reachable (e.g., ping).<\/p>\n<h3 class=\"wp-block-heading\"><strong>8. Are NSE Scripts Safe to Use?<\/strong><\/h3>\n<p><strong>Answer<\/strong>:<\/p>\n<p>Most scripts are safe, but some (e.g., brute, exploit) can disrupt services. Tips:<\/p>\n<p>Start with -script=safe for non-intrusive scans.<\/p>\n<p>Test risky scripts (e.g., http-slowloris) in labs first.<\/p>\n<p>Review script documentation with nmap &#8211;script-help &lt;script-name&gt;.<\/p>\n<h3 class=\"wp-block-heading\"><strong>9. How Can I Speed Up My Nmap Scans?<\/strong><\/h3>\n<p><strong>Answer<\/strong>:<\/p>\n<p><strong>Limit Ports<\/strong>: p 1-1000 scans fewer ports.<\/p>\n<p><strong>Timing Template<\/strong>: Use T4 (aggressive) or T5 (insane).<\/p>\n<p><strong>Parallelism<\/strong>: Increase -min-parallelism 100.<\/p>\n<p><strong>Skip DNS<\/strong>: Add n to disable reverse-DNS resolution.<\/p>\n<h3 class=\"wp-block-heading\"><strong>10. How Do I Update Nmap and Its Scripts?<\/strong><\/h3>\n<p><strong>Answer<\/strong>:<\/p>\n<p><strong>Nmap<\/strong>:<\/p>\n<p>Linux: sudo apt update &amp;&amp; sudo apt upgrade nmap<\/p>\n<p>Windows: Download the latest version from <a href=\"https:\/\/nmap.org\/\">nmap.org<\/a>.<\/p>\n<p><strong>NSE Scripts<\/strong>: sudo nmap &#8211;script-updatedb<\/p>\n<h3 class=\"wp-block-heading\"><strong>Bonus: Can Nmap Exploit Vulnerabilities?<\/strong><\/h3>\n<p><strong>Answer<\/strong>:<\/p>\n<p>No\u2014Nmap is a <strong>reconnaissance tool<\/strong>, not an exploit framework. However:<\/p>\n<p>It <em>detects vulnerabilities<\/em> via NSE scripts (e.g., vuln category).<\/p>\n<p>Pair it with tools like <strong>Metasploit<\/strong> to exploit findings.<\/p>\n<p><strong>Got More Questions?<\/strong><\/p>\n<p>Visit the <a href=\"https:\/\/nmap.org\/book\/man.html\">Official Nmap Documentation<\/a>.<\/p>\n<p>Join the <strong>Nmap community<\/strong> on Reddit, Discord, or mailing lists.<\/p>\n<p>Experiment in safe environments like <strong>Hack The Box<\/strong> or <strong>TryHackMe<\/strong>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Hey guys, Rocky here! \ud83d\udc4b Welcome to your ultimate guide to Nmap\u2014the Swiss Army knife of networking tools! Whether you\u2019re a cybersecurity newbie, a network admin, or just a curious techie, this tutorial will turn you into an Nmap ninja by the time we\u2019re done. Let\u2019s kick things off by answering the big question: What [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":2538,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2537","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2537"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2537"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2537\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/2538"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2537"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2537"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}