The tab Other has additional options such as packet fragmentation, traceroute, verbosity, debugging and additional options shown in the image below.įinally, the tab Timing will allow you to limit the scan time, probes timing, simultaneous scans, delays and additional options related to timing. The tab Source allows to hide your IP address for example by forging a fake address (spoofing), or a specific source port considering some iptables rules may restrict or allow traffic from specific ports, here you can also set the Ethernet device. ![]() Within the Profile menu, next to the Scripting submenu you can find the Target tab which allows to define targets in a variety of ways. Next to the Ping tab, on the Scripting submenu tab you can access the NSE (Nmap Scripting Engine) to add plugins to your scan such as vulnerability scan, bruteforce, traceroute additional features and more. Next to the Scan tab submenu you can find the Ping submenu to enable or disable different discovery methods or probes. Profile: this menu allows to create and edit profiles with predefined options, here you can define the type of Scan on the second TAB after the Profile submenu tab to choose between TCP,SYN, ACK FIN, idle scan, OS detection and others. Tools: this menu allows to compare scan results, search among results and filter hosts. Scan: from this menu you can save and open scan results. Zenmap interface is very intuitive, these are the options of the top menu: Raw packets are sent through a lower level packet restricted for non-root users.Īlso when launching Zenmap from the graphical interface you’ll find the option to run it as root as shown two images above. When launching Zenmap, or Nmap, as an unprivileged user you’ll be limited to execute scans requiring raw packets. While it is easy to use for users who know the theory behind networking some users find difficult or don’t like to interact with the terminal or console, this tutorial explains how to install and use Zenmap, the Nmap graphical interface, a friendly interface for users unfamiliarized with terminals or even MS-Windows users, additionally when using Zenmap it will display the commands used, so using Zenmap would be a good introductory way to learn to use it through the console. Nmap works by analyzing packet responses contrasting them to rules and standards of protocols. Once Installation is done you can access the Zenmap from the Menu as shown hereĪccess the Zenmap application as a root user.Nmap is among the most useful tools for network administrators to diagnose network problems, security auditing and even offensive security, often called the “Swiss Army knife” for sysadmins and hackers Nmap constituted a revolutionary tool which until today leads the market. Processing triggers for menu (2.1.47ubuntu2.1). Processing triggers for gnome-menus (3.13.3-11ubuntu1). Processing triggers for man-db (2.8.3-2). Processing triggers for libc-bin (2.27-3ubuntu1). Update-alternatives: using /usr/lib/x86_64-linux-gnu/blas/libblas.so.3 to provide /usr/lib/x86_64-linux-gnu/libblas.so.3 (libblas.so.3-x86_64-linux-gnu) in auto mode The following NEW packages will be installed: ![]() Liblinear-tools liblinear-dev menu-l10n gksu | kde-runtime | ktsuss ndiff Libblas3 liblinear3 menu nmap python-cairo python-gobject-2 python-gtk2 The following additional packages will be installed: Use ' sudo apt autoremove' to remove them. The following packages were automatically installed and are no longer required:Īpache2-bin apache2-data apache2-utils libapr1 libaprutil1 libaprutil1-dbd-sqlite3 Install the Zenmap package using the following command :~# apt-get install zenmap -y
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |