By Matt Jennings & David Spano.  History of Nmap  What is Nmap  How Nmap works  The goal of Nmap  What is Zenmap  Advantages of Zenmap  How to.

Slides:



Advertisements
Similar presentations
Chapter 7 – Managing Windows XP. Control Panel The main tool for configuring your system. Most of the tools to configure the system come with the normal.
Advertisements

How to download and install Sharpdesk
Web ADI - Srinivas.M. Purpose Data upload into Oracle Applications Solution: Web ADI brings Oracle E-Business Suite functionality to a spreadsheet, where.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
System Security Scanning and Discovery Chapter 14.
Server-Side vs. Client-Side Scripting Languages
Introduction to the Internet How did the Internet start? Why was the Internet developed? How does Internet handle the traffic? Why WWW changed the Internet.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Creating and Publishing Your own website
Copyright Kenneth M. Chipps Ph.D. How to Use SNMP to Collect Network Data Last Update
 Advantages  Easy to learn  Graphical Advantages  Help and Support  Widely used  Software compatibility  Customisable  Customisable Hardware 
Creating and Using Podcasts Stanford University Continuing Studies CS 43 Mark Branom
HiVision SNMP Software.
2. Introduction to the Visual Studio.NET IDE 2. Introduction to the Visual Studio.NET IDE Ch2 – Deitel’s Book.
Security Audit Tools Project. CT 395 IT Security I Professor Igbeare Summer Quarter 2009 August 25, 2009.
Lesson 4 Computer Software
Linux Deploy This application is open source software for quick and easy installation of the operating system (OS) GNU/Linux on your Android device. The.
Linux Operations and Administration
Hardware vs. Software Computer systems consist of both hardware and software. Hardware refers to anything you can physically touch. Keyboards, mice, monitors,
1 GFI LANguard N.S.S VS NeWT Security Scanner Presented by:Li,Guorui.
Honeypot and Intrusion Detection System
The Microsoft Baseline Security Analyzer A practical look….
CMPF124 Personal Productivity with Information Technology Chapter 1 – Part 4 Introduction To Windows Operating Systems Basic Windows Admin Introduction.
Software Software consists of the instructions issued to the computer to perform specific tasks. –The software on a computer system refers to the programs.
Module 2 Part IV Introduction To Windows Operating Systems Basic Windows Admin Introduction To Windows Operating Systems Basic Windows Admin.
Creating and Publishing Your own web site PC Version SEAS 001 Professor Ahmadi.
1/28/2010 Network Plus Unit 4 WAP Configuration WAP Configuration In this section we will discuss basic Wireless Access configuration using a Linksys.
Hands on with BackTrack Information gathering, scanning, simple exploits By Edison Carrick.
How to Take Full Control of the ArrayTools and R Folder You need to have Full Control of the ArrayTools and R installation folders to run BRB-ArrayTools.
Trinity Uses Nmap, shouldn’t you?. From “The Art of War” "... knowing your enemy 100% of the time, you will win your battle 100% of the time, knowing.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
Capabilities of Software. Object Linking & Embedding (OLE) OLE allows information to be shared between different programs For example, a spreadsheet created.
MIS Week 6 Site:
Getting to Know Your Computer Your File System Applications What’s running on your machine Its own devices Networking.
Information Security 493. Lab 10.1: Look for Security Events within Windows XP Logging is automatically enabled for many items on a workstation, but the.
IT1001 – Personal Computer Hardware & System Operations Week5- Installation and configuration of driver software.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Footprinting and Scanning
TUTORIAL #3 INFORMATION SECURITY : LOOK FOR SECURITY EVENTS WITHIN WINDOWS XP Logging is automatically enabled for many items on a workstation,
1 Getting Started with C++ Part 1 Windows. 2 Objective You will be able to create, compile, and run a very simple C++ program on Windows, using Microsoft.
Oracle Virtualization Last Update Copyright 2012 Kenneth M. Chipps Ph.D.
IT Desktop Management GoToMeeting – Online Meeting Service Attendee Guide May 2007 Prepared by Angela Mars IT Education and Training.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
1. Begin Quick Start 2. Administration 3. Good to Know 4. Slightly Technical 5. User Experience 6. You are ready to go !
Jen Beveridge and Joe Kolenda. Developed by Gordon Lyon Features –Host discovery –Port scanning –Version detecting –OS detection –Scriptable interaction.
Top 10 Hacking Tool Welcome TO hackaholic Kumar shubham.
 Step 1: Enabling the keyboard in window Skip this step if the computer does not enter sleep mode or if the computer.
Chapter 2 Operating Systems
Exploring ProFile cont’d.
Jen Beveridge and Joe Kolenda
Chapter Objectives In this chapter, you will learn:
Macintosh & Linux Used to fill in pg 5 & 6 of “Operating Systems” Packet.
How to install Norton Anti-Virus 2017?
Launching of our New Website 14th September 2011
CITA 352 Chapter 5 Port Scanning.
WINS Monthly Meeting www2. widener. edu/wins internet2
Lecture 13 RPM and its advantages.
Footprinting and Scanning
Steps to Install & Uninstall Webroot Antivirus
Call to Fix QuickBooks Error 3371
Everything You Need To Know About Penetration Testing.
6. Operating Systems Finger printing & Scanning
Intro to Ethical Hacking
Intro to Ethical Hacking
HOW TO UNINSTALL AND REINSTALL AOL DESKTOP GOLD IN WINDOWS 10?  Do you have problems with your current version of AOL Desktop Gold? Is your software behaving.
HOW TO INSTALL AOL DESKTOP GOLD The popularity of AOL Desktop Gold in the world of desktop software is increasing and along with it, the demand increases.
office.com/setup
How to install and manage exchange server 2010 OP Saklani.
Presentation transcript:

By Matt Jennings & David Spano

 History of Nmap  What is Nmap  How Nmap works  The goal of Nmap  What is Zenmap  Advantages of Zenmap  How to use Zenmap  References

 Originally created by Gordon Lyon  Published in a 1997 article in Phrack magazine with source code  With community updates came more advance features  Named “Security Product of the Year”  Has appeared in movies: Bourne Ultimatum, The Matrix Reloaded, and Die Hard 4

 Free and open source  Security Scanner  Scan huge networks of literally hundreds of thousands of machines

 Portable  Available for Most OS  Powerful  Large network  Single host  Flexible  Supports advanced techniques  Easy  As simple as entering a target host  Free  Free to download

 Nmap uses raw IP packets in novel ways  To determine what hosts are available on the network,  What services those hosts are offering  What operating systems and OS versions they are running  What type of packet filters/firewalls are in use  Many of other characteristics.

 The primary goal of the Nmap Project is to help make the Internet a little more secure and to provide administrators, auditors, and hackers with an advanced tool for exploring their networks

 Official Nmap Security Scanner GUI  Multi-platform free and open source application  Aim is to make Nmap easy while providing advanced features for experienced Nmap users

 Interactive and graphical results viewing  Comparison  Convenience  Repeatability  Discoverability

1) download windows version from

2) Double click on the exe

3) Double-click on the Zenmap shortcut on your desktop.

4) Type in “scanme.nmap.org”

5) In the Profile field, select “Intense Scan” then press the “Scan” button to begin

6) Click on the “Nmap output” tab

7) Click on the “Ports / Hosts” tab

8) Click on the “Topology” tab

9) Click on the “Host Details” tab

 Using Zenmap was very easy due to its GUI  Installation in Windows is graphical and only requires hitting the “next” button  Nmap and Zenmap documentation is abundant on the zenmap.org site - Available in 16 different languages

 Nmap - Free Security Scanner For Network Exploration & Security Audits. Web. 06 Dec