Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping).
SYSTEM REQUIREMENTS
RAM : Minimum 1 GB
Storage : Minimum 200 MB of Device storage.
OS : Windows, macOS, Linux & many more.
Architecture : 64bit Arx
Available On : PC
ADDITIONAL INFORMATION
Nmap project, A collaborative effort
Led by Gordon Lyon.
September 1997
30.9 MB
Gordon Lyon
Also known as Fyodor Vaskovich.
English
23-April-2024
C, C++, Python, Lua
Cross-platform
NPSL, modified GPLv2
or Proprietary
Nmap is a powerful network scanning and security auditing tool. Here are some key aspects of its usage :
-sp option scans for live hosts on a network. Example : nmap -sp 192.168.1.1/24 -p option scans a single host for 1000 well-known ports. Example : nmap -p 192.168.1.1 -p option scans for specific ports or a range of ports. Example : nmap -p 76-973 192.168.1.1 -sS option performs a stealth scan by sending SYN packets and analyzing responses. Example : nmap -sS 192.168.1.1-sV option detects application versions and operating systems. Example : nmap -sV 192.168.1.1-O option detects operating systems. Example : nmap -O 192.168.1.1-v option provides detailed information about the scan process.-oN option exports scan results to a text file. Example : nmap -oN output.txt 192.168.1.1-oX option exports scan results to XML format. Example : nmap -oX output.xml 192.168.1.1-oA option exports scan results in multiple formats (text, XML, and gnmap). Example : nmap -oA output 192.168.1.1-h option to access Nmap’s built-in help command, which lists available flags and options.nmap -sp 192.168.1.1/24nmap -p 192.168.1.1nmap -sV 192.168.1.1nmap -oN output.txt 192.168.1.1
$ sudo apt install nmap
$ sudo apt -y install hashcat
$ sudo apt update # Debian-based
$ sudo dnf check-update # Fedora-based
sudo apt install nmap -ysudo dnf install nmap -ysudo pacman -S nmapnmap --version.exe file and follow the setup wizard.nmap --versionbrew install nmap
$ sudo apt uninstall nmap
$ sudo apt -y uninstall hashcat
sudo apt remove nmap -ysudo dnf remove nmap -ysudo pacman -R nmapC:\Program Files (x86)\Nmap.brew uninstall nmapCopyright © 2025 HACKERSPOT
All original content, including tools, software, and other information, is protected by copyright and remains the property of its respective owners.
HackerSpot is an informational platform that offers resources such as tools, software, courses, internships, and various other materials aimed at supporting individuals passionate about CyberSecurity and IT.