Nmap - OS And Service Version Scanning
Vložit
- čas přidán 9. 09. 2024
- In this video, I demonstrate how to perform OS and service version scanning and detection with Nmap. Nmap is a free and open-source network scanner created by Gordon Lyon. Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection.
📈 SUPPORT US:
Patreon: / hackersploit
Merchandise: teespring.com/...
SOCIAL NETWORKS:
Reddit: / hackersploit
Twitter: / hackersploit
Instagram: / hackersploit
LinkedIn: / 18713892
WHERE YOU CAN FIND US ONLINE:
Blog: hsploit.com/
HackerSploit - Open Source Cybersecurity Training: hackersploit.org/
HackerSploit Academy: www.hackersplo...
HackerSploit Discord: / discord
LISTEN TO THE CYBERTALK PODCAST:
Spotify: open.spotify.c...
We hope you enjoyed the video and found value in the content. We value your feedback. If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
#Nmap
All things explained fully details. Thank you so much sir
I was about to sleep, then I saw this vid
Nmap is brilliant
Beautiful
I think alexis that -A is for Advanced purpose or you can say it as Advanced Scanning not an Aggressive Scanning (fyodor said this !) and -T(0-5) is for Agressive scanning i think.... I am not bit sure related to this. Please help me to understand their meanings. Great Video and really appreciated. ! completed playlist of Recon-ng V5 and i can say i am now a pro in it :) cz of you ty again. PLease help me with this concepts in nmap :D
Hello @user-xp2hk5ik2b -A is use for activate aggressive detection , namely -A . Aggressive mode enables OS detection ( -O ), version detection ( -sV ), script scanning ( -sC ), and traceroute ( --traceroute ).
at 8:1 they use -p- ??
How do you determine an OS if there are only filtered ports, they have a firewall, IPS, and IDS?
I love you
nice
how comes mine isnt giving me all info such as mac address and os
hey hackersploit
i got a error while scanning os the error is
" too many fingerprints to match the os "
please resolve the error
SCANNED PORTS ARE IN IGNORED STAGE PLEASE HELP
its may be cause indicates that a firewall, filter, or other network issue is blocking the port.
Try using different port scanning techniques and see if you getting any useful information ( -sS -sU -sY -sN -sF -sX ....)
informative but not sequence based
initially uncomfortable for beginner
.
-sn not showing all devices connected on my network. Please help
maybe there is firewall that is blocking the requests. i also encounter the same when i run my scan on host windows machine
bro also use -sS