Nmap termux руководство termux

In this post, You are gonna learn how you can install and use Nmap Tool In termux, And I am also gonna give you some Exmaple commands so you can try it your self. Overall it’s Gonna be a serious posts and if you wanna be a good hacker then you must know how to use Nmap.

What is Nmap in termux?

Nmap is an Open Source Network mapper that allows you to scan your network and collect Important data about the network as well as all the devices connected to it. For becoming a good hacker you must know how to collect data about any device and network and with the help of the Nmap tool you can get all that information in a few commands. To collect the data about the Device Nmap sends a packet and then analyses it to get the Information.

How to Install and Use Nmap In Termux - 2020

With the help of Nmap, you can use the Footprinting technique to gather a lot of information about the Victim networks as well as the system. You can Scan Networks and get information about all the Connected Devices to a particular system. You can scan all the open ports, You can even find the name of all the devices and these Open ports. 

If you want to Scan a Website and know it’s Open port then you can also do that with the help of the Nmap tool, you can find the IPs of the websites. If you wanna know more about Nmap then you can Visit There Offical Site @Nmap.org.

How to install Nmap in termux?

Step 1:

Nmap is a really important tool and we don’t want any bugs while running it so we will first upgrade the packages using the below command.

apt update && apt upgrade -y 

How to Install and Use Nmap In Termux - 2020

This command will Install updates in all the previously installed packages in termux.

Step 2:

Nmap is just a basic Package in termux and you can install it like any other package so To install Nmap in Temux you just have to use the pkg command. Nmap is a small package so it won’t take a lot of data to download it. You can just paste the below command and it will be installed in no time.

pkg install nmap -y

How to Install and Use Nmap In Termux - 2020 

Now if you see the $ sign on your Termux that means its Completely installed.

NOTE: This post is only for educational purposes. I and this site do not support any criminal activity. If you are doing any sort of misuse of this information This site is not responsible for that. THIS SITE ONLY SUPPORT ETHICAL HACKING. 

How to Use Nmap in Termux :

You can do many things with the help of the Nmap tool but in this post, I am gonna give few important commands that will give a brief idea of how you can use the Nmap tool in termux.

How to scan a Website with Nmap Termux :

To scan a Website you must have permissions Else it can cause you Trouble, Nmap allows you to Scan there Test website so, in this post, we will use that website, you just have to type Nmap and then the site name you can paste the below command in the termux to scan the Nmap test website.

nmap Scanme.nmap.org

How to Install and Use Nmap In Termux - 2020

Output :

You can see that we got an IP-Adress of the website in the second line as well as we can see the latency is 0.24 Seconds.and we can also see all the open port of the website.

How to Install and Use Nmap In Termux - 2020

Scan your Local Network with Nmap Termux :

If You just wanna scan your Local network (Your Intire subnet )and know How many devices are connected with your Wifi then you can use this command. This command will give you a list of all Devices in the network as well as you all the open ports of those devices.

nmap 192.168.1.1/24

How to Install and Use Nmap In Termux - 2020

 Output :

Now you can see in the below picture, I have 2 devices in my network. and you can also see all the open ports. The 192.168.1.202 Host is up and the latency is 0.0025s. If you have multiple devices on your network then it will show you a list of all the Devices.

How to Install and Use Nmap In Termux - 2020

Aggressive scan using Nmap Termux :

In the above Local Network scan, It won’t show you detailed information but if you want to see every possible detail then you can use -A argument in the command. I am just gonna use the above command with -A argument.

nmap -A 192.168.1.1/24

How to Install and Use Nmap In Termux - 2020

Output :

Now you can see Its showing iBall Baton I Login as well as it is showing the URL of the login page. This is just my local network that’s why you are unable to see anything interesting but if are scanning any website then it can surely give you some extra data. 

How to Install and Use Nmap In Termux - 2020

Scan a Single port in Nmap Termux :

If you just wanna scan a Single Port of a Particular Ip address then you can do that using the below command. Here I am scanning the entire network for the port 80 but you can put a single IP and it will work Perfectly. The advantage of scanning a single port is that it will save you some extra time especially when you are in a hurry.

nmap -p 80 192.168.1.1/24

How to Install and Use Nmap In Termux - 2020

Output :

Here you can see that Nmap is checking for port 80 only but on my entire network.

How to Install and Use Nmap In Termux - 2020

Scan Multiple Port in Nmap Termux :

Do you know most of the time when you scan a Network and you find a device with open port 80 as well as 443 then it means that its a WebServer? So In the below command, I am gonna scan these two ports on my network, of course, I don’t have a webserver running in my home so it won’t show 443 port but if you scan it in a network where they have a webserver then it will show with this command.

nmap -p 80,443 192.168.1.1/24

How to Install and Use Nmap In Termux - 2020

Output :

In the below picture you can clearly see that it is only checking for 2 port and as the output, we can see in my routers Ip address port 80 is open but port 443 is not. And in my second device, Both ports are closed.

How to Install and Use Nmap In Termux - 2020

Ping A Website or an IP-Address with Nmap in Termux :

If you Quickly wanna Check if a Host is still up or not then you can do a Ping. It will tell you the amount of time it took the Nmap to make a connection with the website or the Device.

nmap -sP 192.168.1.202

How to Install and Use Nmap In Termux - 2020

You can also Type Nmap -sP www.google.com and it will ping the google server and tell you latency. 

Output :

You can see that the latency is 0.02 seconds and the Host is still up.

How to Install and Use Nmap In Termux - 2020

Perform a Quick Scan with Nmap in Termux:

If you just wanna do a quick scan of the network and you only wanna know basic information then you can use -F Argument. It is much faster than the normal scan.

nmap -F 192.168.1.1/24

How to Install and Use Nmap In Termux - 2020

 Output :

Here you can see I got the output much faster and The result is still good.

How to Install and Use Nmap In Termux - 2020

Check Nmap Version in Termux :

If you wanna check the Nmap Version then you can type the below command.

nmap -V

How to Install and Use Nmap In Termux - 2020

Output :

Now you can see the Nmap Version in the below picture.

How to Install and Use Nmap In Termux - 2020

Conclusion :

Nmap is a Fine information gathering tool and it can be useful for people who are at least intermediate hackers. There are more New and advanced Information gathering tools. Most of the Nmap Commands are not working in termux because they require root privileges. Still, you can use this tool to scan networks and you will get decent information about the network. If you have any questions, just ask me in the comments and will surly give you a reply, Thanks For Reading Guys, and as always Stay Ethical👾.

NMAP (Network Mapper) is a free and open-source network scanning tool widely used by network administrators and cybersecurity professionals to discover and map devices on a network. It can scan a range of IP addresses or a single host to identify the services and operating systems running on it. In this article, we will discuss how to install and use NMAP in Termux.

nmap in termux

Installing NMAP in Termux

1. Open Termux on your Android device and update the package repository by running the following command:

pkg update && pkg upgrade -y

2. Install the Nmap package by running the following command:

pkg install nmap 

3. To verify the installation, you can run the nmap command with the —version option

nmap —version 

nmap in termux

Using NMAP in Termux

NMAP provides a wide range of options for scanning networks and hosts. Here are a few examples of how to use NMAP in Termux:

Scanning a range of IP addresses

To scan a range of IP addresses, you can use the -sL option followed by the range of IP addresses you want to scan. For example, to scan the range 192.168.1.1-255, you can use the following command:

 nmap -sL 192.168.1.1-255

This will list all the IP addresses within the specified range.

Scanning a single host

To scan a single host, you can use the -sV option followed by the hostname or IP address of the host you want to scan. For example, to scan the host www.example.com, you can use the following command:

nmap -sV http://scanme.nmap.org/

This will scan the specified host and report the services and operating system running on it.

Scanning a range of ports

NMAP can also be used to scan a range of ports on a host. To do this, you can use the -p option followed by the range of ports you want to scan. For example, to scan the range of ports 1-1000 on the host www.example.com, you can use the following command:

 nmap -p 1-1000 www.example.com

This will scan the specified host and report the status of the ports within the specified range.

Performing an OS detection scan

NMAP can also be used to detect the operating system of a host. To do this, you can use the -O option followed by the hostname or IP address of the host you want to scan. For example, to detect the operating system of the host www.example.com, you can use the following command:

nmap -O www.example.com

This will scan the specified host and attempt to detect the operating system running on it.

Also Read:

  • Ethical Hacking With Termux App
  • How to install cmatrix in termux
  • How to use Metasploit in termux

Conclusion

In this article, we have discussed how to install and use NMAP in Termux. NMAP is a powerful and versatile tool that can be used to scan networks and hosts to identify the services and operating systems running on them. By following the steps outlined in this article, you can easily install and use NMAP in Termux on your Android device. We have a comprehensive nmap tutorial

  1. [​IMG]

    Инструменты для пентеста в termux , в этой статье мы разберем основные инструменты для пентеста, и попробуем их в действии.

    [​IMG]
    Nmap — свободная утилита предназначенная для разнообразного сканирования IP сетей.

    Установка :

    pkg update
    pkg upgrade
    pkg install nmap

    Nmap очень полезный сканер, даже провести скан на отрытые порты, с помощью nmap делать гораздо удобнее, давайте разберем некоторые команды :

    Команда которая пропингует вам ip:

    Быстрое сканирование открытых портов :Полное сканирование открытых портов :(1-10000 это диапазон сканирования портов ,т.е все 10000 портов будут перебраны)
    [​IMG]
    Определение операционной системы + MAC адрес:Определение сервисов которые висят на открытых портах:Подмена MAC адреса при сканировании жертвы :

    nmap --spoof-mac 0 192.168.1.2

    Ищем уязвимости порта :

    nmap -sC 192.168.0.112 -p 80

    Вместо 80 пишем другой открытый порт
    Проверка ip на доступность:

    [​IMG]
    Список ключей nmap:

    -sL — создать список работающих хостов;
    -sP — проверка доступен ли ip;
    -PN — считать все хосты доступными, даже если они не рабочие;
    -sS/sT/sA/sW/sM — сканирование tcp портов;
    -sU — сканирование udp портов;
    -sN/sF/sX — TCP NULL и FIN сканирование;
    -sC — запускать скрипт по умолчанию;
    -sI — Indle сканирование;
    -p — указать диапазон портов для проверки;
    -sV — детальное исследование портов для определения версий служб;
    -O — определить операционную систему;
    -T[0-5] — скорость сканирования, чем больше, тем быстрее;
    -D — маскировать сканирование с помощью фиктивных IP;
    -S — изменить свой IP адрес на указанный;
    -e — использовать определенный интерфейс;
    —spoof-mac — установить свой MAC адрес;
    -A — определение операционной системы с помощью спец. скриптов.

    Итак, утилита nmap , это в первую очередь очень мощный поисковик, без которого в мир пинтеста нам никуда. Спасибо за внимание, знаю что рассказал не всё, но думаю еще про nmap будут статьи.

    Последнее редактирование: 17 май 2022

HLampc.Ru

Гайд по nmap в termux

Termux, please

Всем привет! хочу рассказать вам про утилиту nmap. Вы конечно все про нее слышали, и даже наверное использовали, но я хочу рассказать про его мощь. Поехали!

Сначала покажу как установить nmap, всего лишь 3 команды.

pkg update
pkg upgrade
pkg install nmap

Команда запуска

Синтаксис запуска очень прост:

nmap опции ip_адрес

А сейчас я покажу основные опции nmap:

-sL — создать список работающих хостов;
-sP — проверка доступен ли ip;
-PN — считать все хосты доступными, даже если они не рабочие;
-sS/sT/sA/sW/sM — сканирование tcp портов;
-sU — сканирование udp портов;
-sN/sF/sX — TCP NULL и FIN сканирование;
-sC — запускать скрипт по умолчанию;
-sI — Indle сканирование;
-p — указать диапазон портов для проверки;
-sV — детальное исследование портов для определения версий служб;
-O — определить операционную систему;
-T[0-5] — скорость сканирования, чем больше, тем быстрее;
-D — маскировать сканирование с помощью фиктивных IP;
-S — изменить свой IP адрес на указанный;
-e — использовать определенный интерфейс;
—spoof-mac — установить свой MAC адрес;
-A — определение операционной системы с помощью спец. скриптов.

nmap в действии

Давайте попробуем определить oc одного из серверов google:

nmap -A 173.194.73.102

Как видим у них стоит linux:

Чтобы посмотреть все подключенные в локальной сети устройства пишем:

nmap -sn 192.168.0.1/24

Вместо 192.168.0.1 пишем ip адрес роутера в локальной сети.

Как видим, мы увижели локальные ip адреса:

Теперь можем сканировать данные ip:

nmap 192.168.0.112

Для более детально информации вводим:

nmap -sV 192.168.0.112

Также можно попытаться найти уязвимость порта с помощью спец. скриптов nmap:

nmap -sC 192.168.0.112 -p 23

вместо 23 пишем открытый порт.

Вывод

Nmap очень годный инструмент которым нужно пользоваться.

Спасибо за прочтение!

  • ✅Основной канал — https://t.me/under_public
  • 🏴‍☠️ Приватный канал — https://t.me/joinchat/AAAAAEmM-bkL9Pv7KLyL7w
  • 🛒Хакерский aliexpress — https://t.me/hackali0x41
  • 👨‍💻Termux, please — 100% termux
  • 👹ZLinux — чем Zлее Linux, тем ты сильнее.
  • 📮ИБ News — самые свежие и интересные новости Информационной Безопасности.
  • 🌐TG-канал форума: https://t.me/darksploit0x41
  • Наш форум: https://darksploit.su/
  • Чат — https://t.me/UnderChats

Со всеми предложениями и идеями для статей пишите нашему боту @undermbot

Также вы можете присылать ваши статьи в бота (оформляйте в телеграфе), я их просмотрю, если всё ОК — опубликую статью на канале с указанием автора.

Hey folks! In this article I’m listing out some of the most used nmap tool commands that can be used for foot-printing purposes. I’ve tried my best to sort out most of them. But if you find any missing not mentioned here that you know, please comment below. This kind gensture will surely add knowledge of me & others.

Basic Scanning Techniques

Scan a single target —> nmap [target]

Scan multiple targets —> nmap [target1,target2,etc]

Scan a list of targets —-> nmap -iL [list.txt]

Scan a range of hosts —-> nmap [range of IP addresses]

Scan an entire subnet —-> nmap [IP address/cdir]

Scan random hosts —-> nmap -iR [number]

Excluding targets from a scan —> nmap [targets] –exclude [targets]

Excluding targets using a list —> nmap [targets] –excludefile [list.txt]

Perform an aggressive scan —> nmap -A [target]

Scan an IPv6 target —> nmap -6 [target]

Discovery Options

Perform a ping scan only —> nmap -sP [target]

Don’t ping —> nmap -PN [target]

TCP SYN Ping —> nmap -PS [target]

TCP ACK ping —-> nmap -PA [target]

UDP ping —-> nmap -PU [target]

SCTP Init Ping —> nmap -PY [target]

ICMP echo ping —-> nmap -PE [target]

ICMP Timestamp ping —> nmap -PP [target]

ICMP address mask ping —> nmap -PM [target]

IP protocol ping —-> nmap -PO [target]

ARP ping —> nmap -PR [target]

Traceroute —> nmap –traceroute [target]

Force reverse DNS resolution —> nmap -R [target]

Disable reverse DNS resolution —> nmap -n [target]

Alternative DNS lookup —> nmap –system-dns [target]

Manually specify DNS servers —> nmap –dns-servers [servers] [target]

Create a host list —-> nmap -sL [targets]

Advanced Scanning Options

All Nmap tool commands at your fingertips!

TCP SYN Scan —> nmap -sS [target]

TCP connect scan —-> nmap -sT [target]

UDP scan —-> nmap -sU [target]

TCP Null scan —-> nmap -sN [target]

TCP Fin scan —> nmap -sF [target]

Xmas scan —-> nmap -sX [target]

TCP ACK scan —> nmap -sA [target]

Custom TCP scan —-> nmap –scanflags [flags] [target]

IP protocol scan —-> nmap -sO [target]

Send Raw Ethernet packets —-> nmap –send-eth [target]

Send IP packets —-> nmap –send-ip [target]

Port Scanning Options

Perform a fast scan —> nmap -F [target]

Scan specific ports —-> nmap -p [ports] [target]

Scan ports by name —-> nmap -p [port name] [target]

Scan ports by protocol —-> nmap -sU -sT -p U:[ports],T:[ports] [target]

Scan all ports —-> nmap -p “*” [target]

Scan top ports —–> nmap –top-ports [number] [target]

Perform a sequential port scan —-> nmap -r [target]

Version Detection

Operating system detection —-> nmap -O [target]

Submit TCP/IP Fingerprints —-> http://www.nmap.org/submit/

Attempt to guess an unknown —-> nmap -O –osscan-guess [target]

Service version detection —-> nmap -sV [target]

Troubleshooting version scans —-> nmap -sV –version-trace [target]

Perform a RPC scan —-> nmap -sR [target]

Timing Options

Timing Templates —-> nmap -T [0-5] [target]

Set the packet TTL —-> nmap –ttl Thursday, October 08, 2016 16:14 UTC+9 [target]

Minimum of parallel connections —-> nmap –min-parallelism [number] [target]

Maximum of parallel connection —-> nmap –max-parallelism [number] [target]

Minimum host group size —–> nmap –min-hostgroup [number] [targets]

Maximum host group size —-> nmap –max-hostgroup [number] [targets]

Maximum RTT timeout —–> nmap –initial-rtt-timeout Thursday, October 08, 2016 16:14 UTC+9 [target]

Initial RTT timeout —-> nmap –max-rtt-timeout [TTL] [target]

Maximum retries —-> nmap –max-retries [number] [target]

Host timeout —-> nmap –host-timeout Thursday, October 08, 2016 16:14 UTC+9 [target]

Minimum Scan delay —-> nmap –scan-delay Thursday, October 08, 2016 16:14 UTC+9 [target]

Maximum scan delay —-> nmap –max-scan-delay Thursday, October 08, 2016 16:14 UTC+9 [target]

Minimum packet rate —-> nmap –min-rate [number] [target]

Maximum packet rate —-> nmap –max-rate [number] [target]

Defeat reset rate limits —-> nmap –defeat-rst-ratelimit [target]

Firewall Evasion Techniques

Fragment packets —-> nmap -f [target]

Specify a specific MTU —-> nmap –mtu [MTU] [target]

Use a decoy —-> nmap -D RND: [number] [target]

Idle zombie scan —> nmap -sI [zombie] [target]

Manually specify a source port —-> nmap –source-port [port] [target]

Append random data —-> nmap –data-length [size] [target]

Randomize target scan order —-> nmap –randomize-hosts [target]

Spoof MAC Address —-> nmap –spoof-mac [MAC|0|vendor] [target]

Send bad checksums —-> nmap –badsum [target]

Output Options

Save output to a text file —-> nmap -oN [scan.txt] [target]

Save output to a xml file —> nmap -oX [scan.xml] [target]

Grepable output —-> nmap -oG [scan.txt] [target]

Output all supported file types —-> nmap -oA [path/filename] [target]

Periodically display statistics —-> nmap –stats-every Thursday, October 08, 2016 16:14 UTC+9 [target]

133t output —-> nmap -oS [scan.txt] [target]

Troubleshooting and debugging

Help —> nmap -h

Display Nmap version —-> nmap -V

Verbose output —-> nmap -v [target]

Debugging —-> nmap -d [target]

Display port state reason —-> nmap –reason [target]

Only display open ports —-> nmap –open [target]

Trace packets —> nmap –packet-trace [target]

Display host networking —> nmap –iflist

Specify a network interface —> nmap -e [interface] [target]

Nmap Scripting Engine

Execute individual scripts —> nmap –script [script.nse] [target]

Execute multiple scripts —-> nmap –script [expression] [target]

Script categories —-> all, auth, default, discovery, external, intrusive, malware, safe, vuln

Execute scripts by category —-> nmap –script [category] [target]

Execute multiple scripts categories —-> nmap –script [category1,category2, etc]

Troubleshoot scripts —-> nmap –script [script] –script-trace [target]

Update the script database —-> nmap –script-updatedb

 Judging two outptus : Ndiff

Ndiff verbose mode —-> ndiff -v [scan1.xml] [scan2.xml]

Comparison using Ndiff —-> ndiff [scan1.xml] [scan2.xml]

XML output mode —-> ndiff –xml [scan1.xm] [scan2.xml]


Did you like this article? Let us know in the comments below 🙂

Thank you!

Понравилась статья? Поделить с друзьями:
  • Противовирусные таблетки триазавирин инструкция по применению цена
  • Инструкция по эксплуатации порше кайен 957
  • Винпоцетин форте канон инструкция по применению цена отзывы аналоги
  • Мазь пропоцеум инструкция по применению цена
  • Вопрос к слову руководство