Skip to content
Business IT Services, Support Melbourne
  • IT Services
    • Managed IT Services
    • Cloud Services
    • Microsoft 365 Managed Service
    • IT Consulting Services
    • Remote IT Support
    • Business Communication
      • Get started with 3CX
  • Industries
    • Accounting Firms
    • Law Firms
    • Realestate
    • Medical Centres
    • Pharmacies
    • Conveyancing Firms
  • Cybersecurity
    • SaaS Security
    • Assessment
    • The Essential Eight
      • Quick Assessment
    • Playbooks
    • Computer Security Threats
  • Remote IT Support
    • TeamViewer Windows
    • TeamViewer Mac
    • TeamViewer Linux
Get in Touch

Windows

23
  • Command and PowerShell History
  • How to increase the disk size of VM in VirtualBox
  • Saved Windows Credentials
  • View installed software using wmic
  • How to Disable Revocation Check for SSTP VPN
  • Enabling Group Policy editor on Windows 10 Home
  • Source file names are larger than supported file system
  • How to change file creation or modified date
  • Another account from your organisation is already signed in
  • How to check if Microsoft Defender for Endpoint is running
  • Disabling Office 365 Autodiscover – Exchange Self hosted
  • Access to Removable Drives not Protected by BitLocker
  • The Group Policy settings for BitLocker startup options are in conflict and cannot be applied
  • How do you extend a User Profile Disk
  • Resizing User Virtual Disk RDP (Esxi VM)
  • Essential Network Ports for Windows Services
  • Why does OneDrive keep duplicating files
  • Troubleshooting USB devices
  • Download Maps Manager Delayed Start Red in Server 2016
  • Pros and cons working with DNS, DHCP, IPAM, Wireless, LAN, WAN
  • What is a DHCP Servers and DHCP relays
  • How to find user profile disk from registry
  • Understanding Multi-Factor Authentication
Linux

Linux

8
  • Rsync linux
  • CSF Shell Command
  • mysql-8.0-gpg package error
  • Linux Exim Cheat sheet
  • csf configserv commands
  • Nmap cheat sheet
  • nmap
  • Windows Privilege Escalation

Networking

4
  • Cannot access FortiGate web GUI admin interface
  • How to find Fortinet PSK
  • Pros and cons working with DNS, DHCP, IPAM, Wireless, LAN, WAN
  • Disabling SIP ALG on FortiGate Firewall

General IT Support

12
  • TPM has malfunction error 80090016 keyset does not exist
  • Command and PowerShell History
  • How to increase the disk size of VM in VirtualBox
  • Saved Windows Credentials
  • View installed software using wmic
  • How to improve the WIFI coverage in the office
  • Best Practices for Data Backup and Recovery
  • How to change file creation or modified date
  • How to sync a SharePoint site with OneDrive
  • Cannot access FortiGate web GUI admin interface
  • Pros and cons working with DNS, DHCP, IPAM, Wireless, LAN, WAN
  • What is a DHCP Servers and DHCP relays

Network Connectivity

4
  • How to improve the WIFI coverage in the office
  • Common Internet connectivity problems and solutions
  • What is SSTP VPN?
  • Enabling iPhone hotspot

Cyber Security & Compliance

3
  • How to check if Microsoft Defender for Endpoint is running
  • The Group Policy settings for BitLocker startup options are in conflict and cannot be applied
  • Windows Privilege Escalation

Remote IT Support & Helpdesk

5
  • Atera client not showing up in Customer’s dashboard
  • The Group Policy settings for BitLocker startup options are in conflict and cannot be applied
  • How do you extend a User Profile Disk
  • Resizing User Virtual Disk RDP (Esxi VM)
  • mysql-8.0-gpg package error
View Categories
  • Home
  • kb
  • Linux
  • nmap

nmap

3 min read

How to get started with Nmap #

Network security is a crucial aspect of modern IT infrastructure, and understanding how to assess vulnerabilities is essential for professionals working in cybersecurity and network administration. One of the most powerful and widely used tools for network scanning and security auditing is Nmap (Network Mapper). This essay provides a step-by-step guide on getting started with Nmap, covering installation, basic commands, and practical use cases.

What is Nmap? #

Nmap is an open-source tool designed for network discovery and security auditing. It can rapidly scan large networks to identify live hosts, open ports, running services, and potential vulnerabilities. System administrators, penetration testers, and cybersecurity professionals commonly use Nmap to gain insights into network structures and enhance security.

Installing Nmap #

Nmap is available for Windows, Linux, and macOS. Installation is straightforward:

  • Windows: Download the installer from the official Nmap website and follow the installation wizard.
  • Linux: Most Linux distributions include Nmap in their package repositories. Install it using:
  sudo apt install nmap  # Debian/Ubuntu
  sudo yum install nmap  # RHEL/CentOS
  sudo pacman -S nmap    # Arch Linux
  • macOS: Install using Homebrew:
  brew install nmap

Basic Nmap Commands #

Once installed, Nmap can be used to scan networks and individual hosts. Here are some fundamental commands:

  1. Scanning a Single Host:
   nmap 192.168.1.1

This scans the specified IP address and returns open ports and basic service information.

  1. Scanning a Range of IPs:
   nmap 192.168.1.0/24

This command scans all hosts in the subnet (192.168.1.0 to 192.168.1.255).

  1. Detecting Services and Versions:
   nmap -sV 192.168.1.1

The -sV flag attempts to identify versions of running services.

  1. Running an Aggressive Scan:
   nmap -A 192.168.1.1

The -A option enables OS detection, version detection, script scanning, and traceroute.

  1. Checking for Open Ports:
   nmap -p 80,443 192.168.1.1

The -p flag allows you to specify ports (e.g., 80 and 443 for HTTP and HTTPS).

  1. Scanning with Stealth Mode:
   nmap -sS 192.168.1.1

The -sS flag initiates a SYN scan, which is less detectable by firewalls.

Advanced Nmap Features #

Beyond basic scanning, Nmap offers more advanced capabilities:

  • Detecting Operating Systems:
  nmap -O 192.168.1.1

This helps identify the OS running on a target machine.

  • Running NSE (Nmap Scripting Engine) Scripts:
  nmap --script=vuln 192.168.1.1

This executes vulnerability detection scripts from the Nmap Scripting Engine.

  • Exporting Scan Results:
  nmap -oN output.txt 192.168.1.1

This saves the scan results to a text file for later analysis.

Practical Use Cases of Nmap #

Nmap is widely used for various cybersecurity tasks, including:

  • Network Discovery: Identifying live hosts in a network.
  • Security Auditing: Checking for open ports and misconfigured services.
  • Penetration Testing: Finding vulnerabilities in a system before attackers do.
  • Compliance Monitoring: Ensuring that network security aligns with industry regulations.

Nmap is a powerful and versatile tool for network scanning and security assessment. Learning its basic commands and features allows IT professionals to enhance network security, identify vulnerabilities, and conduct efficient security audits. Whether you are an ethical hacker, network administrator, or cybersecurity enthusiast, mastering Nmap can significantly improve your ability to assess and secure IT environments.

Want to learn more about nmap? Check the Linux nmap man page.

Share This Article :
  • Facebook
  • X
  • LinkedIn
  • Pinterest
Nmap cheat sheetWindows Privilege Escalation
Table of Contents
  • How to get started with Nmap
    • What is Nmap?
    • Installing Nmap
    • Basic Nmap Commands
    • Advanced Nmap Features
    • Practical Use Cases of Nmap
Melbourne business IT logo

Melbits is Melbourne Business IT Service and technology solutions provider. Our tailored and strategic approach ensures that your business will receive expert IT support, cybersecurity and consulting that aligns with your business needs, empowering your business, driving growth and success.

You can reach us at 03 9069 6788

IT Services

  • Managed IT Services
  • Cloud Services
  • Cybersecurity
  • Remote IT Services
  • Business Communication
  • IT Consulting

Industries

  • Accounting Firms
  • Law Firms
  • Realestate
  • Medical Centres
  • Pharmacies
  • Conveyancing Firms

Additional Links

  • About Us
  • Knowledge Base
  • Case Studies
  • Blog
  • Contact
  • FAQ

© 2025 Melbit Services, All Rights Reserved.

  • Terms and Conditions
  • Privacy Policy