Nmap Tutorial For Beginners - 2 - Advanced Scanning

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
hey guys hackersploit here back again with another video and welcome to the second and map tutorial i'm really sorry for the late upload uh so yeah let's get started so in this video what i'm going to be showing you are a few advanced nmap commands and i'm going to show you how to actually scan with nmap and what to do with the results and how to read the results all right so obviously if you have installed it on linux you open your terminal or on windows open your command prompt and you initialize nmap so what i'm going to do is uh i'm going to open the help nmap help all right because i just want to show you guys something all right so as i mentioned in the previous video the help command will basically give you like all the options and some examples all right so for this what so let's actually scan something um so what i'm going to do is i'm going to hit end map that's how you initialize the scan and what i'm going to do is i'm going to scan the nmap scanning domain the one they allow you to use for educational purposes i'm just going to scan it and the reason i'm going to do this is i just want to show you what results you get when you don't use any options all right so let's scan it and it'll probably take a few seconds regardless of your internet connection and i'll explain why it takes uh some time in a few seconds let me just finish the scan uh so basically what it's gonna do is it's going to start scanning for open ports as you can see it's scanned for open ports now by default nmap will scan a thousand ports all right but it can go it can scan up to about 6500 ports so by default it's going to scan a thousand ports that's why it took like 15 seconds as it says here so it's going to start the scan and it's going to give you the latency which is pretty okay and it's going to show you the ports it's going to say it's going to say here not shown these are the closed ports 996. that means 996 or a thousand minus 986 is four parts that's how many ports are actually open or filtered now let me explain um what that means so down here it's going to give you all the ports that are actually active right so we have the 22 port which is basically ssh we have the 80 http and we have nping and echo these are really not very important and are really not targeted that much but in the state option here it's either going to be open or filtered right now none of these ports is giving that state of filtered now if you ever see filtered what it means is that nmap cannot really determine whether the port is open or closed so you really want to stay away from the filtered state ports so basically it scanned a thousand ports and it's given us the ones that are open and basically from here you can select the port you want to attack now in hacking terminology this is really really poor or bad practice now why am i saying that is because you're actually just wasting time scanning through all the ports that you really don't need so what what a hacker would do or a penetration tester he would have the specific services he would want to attack for example if you wanted to attack ssh you would target the 22 port and i'm going to show you how to do that right now how to target specific ports and uh yeah and in addition to that i'm going to show you how to save the scan results now why am i saying why is this important really uh well it's because if you're going to perform these massive scans on big websites or ip or a large amount of i the ip range is very large it's going to take time and it's going to have a lot of a lot of data that is going to retrieve from the scan right and most uh usually this is a common mistake with beginners is they usually perform a scan and then they close the terminal by mistake and all the scan results are gone and the scan could have taken for example a few hours and all of that's gone down the drain so it's always good practice to just save every scan so you can refer to it and you can look at the results you got and it's just always a good practice so let's actually start a scan but for this i'm actually going to use my subnet um my basic my network subnet my my wi-fi or my home network subnet so how i'm going to do this is you need your subnet ip which you can find by hitting ifconfig there we are and once it opens ifconfig you want to go to the current network interface that you are using so if using ethernet ethernet 0 would be the option and if you're using wi-fi that would be the one so you in i'm currently using ethernet and what you want to do is you want to scroll down to inet this line right here now you'll want to look at netmask netmask will basically give you the maximum range that that the ips go to so what my ip would be is 192.168.1.0 to 255. now let me illustrate this so we're actually going to scan my subnet to see what ports are open and i'm going to output it to a um to a grippable output let me just write it uh let me write the command and i'm going to explain as we go so again to initialize we use nmap right and now we're going to use a special type of output called a grappable output which is basically like a document but it just sorts the data out very very neatly or it formats the the data very neatly so i'm going to say output a small o and a big g all right excuse me sorry you want to add the hyphen um small o and big g that's grippable output now you want to enter the ip range right so 192.1 68 that's mine sorry 168.1 point zero to 255 so that's my ip range all right so for this example i'm not going to target any specific port i just want to show you first how to save the results and what what results we're actually going to get so now we want to um we want to get some more information about the scan i talked about this in the previous video we're going to use the verbose command which will basically give us information about the scan and it's just going to print out all the data that's that's actually being what's going on during the scan however there is a second command that will give us like everything that this can whatever is going on in the scan and that's a double v which means double verbose so it's just giving you more information after the double verbose you want to add a greater than sign like we did in the in the previous video but we just want one and we're going to select a directory to save the grappable output file so i'm going to select my desktop which is at home my username alexis and desktop and after that we want to give it that we want to give the grippable output we want to give it a name we want to give the file a name so let's i'm going to call this results all right and i'm just going to hit enter and as you see uh i'll get a results file here on the desktop and it's going to finish the scan now if i open the results file we're going to get all the results so as i mentioned it's going to start scanning the ports it's going to scan a thousand ports until it finds any open any open ports so as you can see these are all down down down down all the ports go down until we have it gets to the first dot one where we have a basically we have a port 21 which is um ecp ftp and then we have port 80 which is http and we have we have about three uh open so that's basically how to output the the results to a very neatly arranged document which is the graphable output as you can see here and it's actually going to give you the time you performed the scan so it's very good documentation now if you want to target a specific port what you're going to do is um i'm just going to leave that there and we're going to we're going to save another grabable output file what i'm going to do is i'm going to we're going to use the same command all right you just hit the up button and when you're on the terminal it's going to open the previous command you entered and we're just gonna enter one uh little thing right here which is the hyphen p which is the port and we're gonna say port 22 right and if we hit enter it's gonna it's gonna say results and i actually forgot to name the results into another file but hopefully it's merged as you can see it actually added to the first ones uh we know we targeted port 22 so let's see if it actually got 22 there we are so it actually got 22 and ssh is actually active and it's going to give you the time it finished and how long it took to scan so that's basically how you output and how to basically um scan according to your specifications there are a lot of other commands which i'll be going through i'll be going through a bit of the more important ones but this is just it for this video i want you guys to just practice with the ports and saving it you can also try and save it to a txt document and you'll see the difference between the two otherwise guys thanks for watching if this video did help you leave a like if you enjoyed the video leave a like if you didn't like the video dislike the video and let me know in the comment section if you have any comments hit me up on kick the comment section my social networks you can hit me up anywhere and i'll and i'll always answer your questions uh otherwise guys uh uh one more thing i wanted to ask you guys is i just want you guys to just share my videos so it reaches a lot more people than it actually does right now so we can actually help more people because a lot of people need this content and they actually can get it and the reason i'm creating this because i really want to help people learn all of these things and i'm doing it for free so i hope you you guys can really help me out there thank you for some a lot of the support um and yeah guys thank you so much for watching and i'll see you in the next one peace
Info
Channel: HackerSploit
Views: 318,519
Rating: undefined out of 5
Keywords: hacking, linux, scanning, nmap full tutorial, nmap kali, nmap tutorial for windows, nmap tutorial kali linux, nmap tutorial windows 7, nmap 101, nmap android, nmap beginner, nmap for hacking, nmap basics, nmap, nmap advanced, nmap and metasploit, nmap attack, nmap avanzado, nmap complete tutorial, nmap course, nmap defcon, nmap ddos, kali linux hacking tutorials, kali linux tutorial for beginners, kali linux tutorials, kali linux 2016.2, kali linux commands
Id: VFJLMOk6daQ
Channel Id: undefined
Length: 10min 19sec (619 seconds)
Published: Sun Mar 19 2017
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.