NMAP Documentation

Documentation

The Nmap project tries to defy the stereotype of some open source software being poorly documented by providing a comprehensive set of documentation for installing and using Nmap. This page links to official Insecure.Org documentation, and generous contributions from other parties.

Nmap Reference Guide

The primary documentation for using Nmap is the Nmap Reference Guide. This is also the basis for the Nmap man page (nroff version of nmap.1). It was rewritten from scratch in late 2005 and is meant to serve as a quick-reference to virtually all Nmap command-line arguments, but you can learn even more about Nmap by reading it straight through. The 18 sections include Brief Options Summary, Firewall/IDS Evasion and Spoofing, Timing and Performance, Port Scanning Techniques, Usage Examples , and much more.

We have been overwhelmed by offers to translate the man page to other languages. That is fantastic, as it makes Nmap more accessible around the world. The following languages are now available:

Chinese Croatian English (Original) French
Japanese Italian Polish Portuguese (Brazil)
Portuguese (Portugal) Romanian Slovak Spanish

The links above go to the HTML guide. Nroff (man page format) and DocBook XML (source) versions of each man page translation can be found here. If you would like to translate to a language not mentioned above, please read the instructions and FAQ and then mail Fyodor. It is a lot of work, but the reward is that thousands of people may benefit from your translation every month.

Other Insecure.Org Documentation

Installation is made easy by the detailed Nmap Installation Guide. This covers topics such as UNIX compilation and configure directives and Installing Nmap on Linux, Windows, Mac OS X, Free/Open/NetBSD, Solaris, Amiga, and HP-UX. It also covers Nmap removal in case you change your mind.

Nmap's newest major feature is the Nmap Scripting Engine, which extends Nmap's functionality using the simple and efficient LUA programming language. Starting with the Nmap 4.21ALPHA series, Nmap includes dozens of valuable scripts for network discovery and vulnerability detection, and you can also write your own. We describe the system in depth (from simple usage instructions to writing your own scripts) in our NSE documentation.

Interested in how nmap uses TCP/IP fingerprinting for remote OS detection? We have written a detailed article on the 2nd Generation Nmap OS Detection System. We also have an old article about the 1st generation system, which people have generously translated into French, Portuguese, Italian, Russian, Spanish, German, Japanese, Chinese, Traditional Chinese (Big5), Turkish, Hebrew, Indonesian, Dutch. Polish, and Swedish.

Nmap Version Detection: Instead of using a simple nmap-services table lookup to determine a port's likely purpose, Nmap will (if asked) interrogate that TCP or UDP port to determine what service is really listening. In many cases it can determine the application name and version number as well. Obstacles like SSL encryption and Sun RPC are no threat, as Nmap can connect using OpenSSL (if available) as well as utilizing Nmap's RPC bruteforcer. IPv6 is also supported. Learn all about this great feature in our Version Detection Paper

Nmap now has an official cross-platform GUI named Zenmap. It is included in most of the packages on the Nmap download page. It is documented in the Zenmap User's Guide. More information is available from the Zenmap site and Zenmap man page.

One of the coolest, yet still relatively obscure features of Nmap is the IPID Idle scan (-sI). Not only does this allow for a completely blind portscan (no packets sent to the target from your real IP), but it can even allow you to bypass packet filters in certain circumstances. We wrote a Idle scanning paper describing this technique as well as several other exploits based on predictable IPID sequence numbers. It includes real-life examples as well as a section on defending yourself from these techniques.

The most important changes (features, bugfixes, etc) in each Nmap version are described in its ChangeLog.

While it is now only of historical interest, Nmap was first released in a September 1, 1997 Phrack 51 Article titled The Art of Port Scanning

Books

This section covers books written/co-authored by Nmap Author Fyodor or that cover Nmap extensively.


Fyodor has co-authored a novel on hacking, along with FX, Joe Grand, Kevin Mitnick, Ryan Russell, Jay Beale, and several others. Their individual stories combine to describe a massive electronic financial heist. While the work is fiction, hacks are described in depth using real technology such as Nmap, Hping2, OpenSSL, etc. Stealing the Network: How to Own a Continent can be purchased at Amazon (save $17), and your can read Fyodor's chapter online for free. STC was a best-seller, ranking for a while as the second-highest selling computer book on Amazon.

Syngress has released a sequel: Stealing the Network: How to Own an Identity. They have generously allowed Fyodor to post his favorite chapter for free. So enjoy Bl@ckTo\/\/3r, by Nmap contributor Brian Hatch. It is full of wry humor and creative security conundrums to keep the experts entertained, while it also offers security lessons on the finer points of SSH, SSL, and X Windows authentication and encryption.

Nmap author Fyodor is finishing up a comprehensive book on Nmap. Nmap Network Scanning is designed to serve all skill levels, from the Nmap newbie to advanced users interested in firewall and IDS evasion, performance optimizations, etc. Release is expected in 2008, and you can learn more here.

James Messer has written Secrets of Network Cartography, a 230-page eBook on Nmap. PDFs can be purchased, or you can view the ad-supported HTML version for free.

Syngress has released Nmap in the Enterprise: Your Guide to Network Scanning by Angela Orebaugh and Becky Pinkard.

3rd Party Docs

Some of the best (and certainly most creative!) documentation has been conrtibuted by Nmap users themselves. If you write an interesting or useful document about Nmap, please send the announcement to nmap-dev or directly to Fyodor.

James “Professor” Messer has released Nmap Secrets, the first interactive video training course for Nmap. It contains 11 modules with hours of instruction starting with “Nmap Basics” and proceeding up to firewall evasion and “Ninja Scanning”. The course costs $197 and offers a money-back guarantee. James also runs regular free Nmap Webinars. Learn more at ProfessorMesser.Com.

A detailed Nmap Tutorial [2006] has been maintained since 2003 by Andrew Bennieston (Stormhawk).

Mohamed Aly has created this single-page (PDF) Nmap Mindmap as a convenient reference to all of the major Nmap options. [2006]

Mark Wolfgang has written an excellent paper on advanced host discovery using Nmap. Here is the PDF paper [local copy] and associated source code. [2002]

Adrian Crenshaw has made a couple excellent video tutorials in Flash. Check out Volume 1: Basic Nmap Usage and Volume 2: Port Scan Boogaloo. [2005]

Meanwhile, the HaXXXor girls have produced a sexier but much less comprehensive Nmap training video (not safe for work).

Long-time Nmap contributor Lamont Granquist wrote a clear and useful (if dated) guide to getting started with nmap. [1999]

Raven Alder has written a short guide named Nmap -- looking from the outside in for LinuxChix. [2002]

Uh-oh! Security expert and Counter Hack author Ed Skoudis has discovered our secret partnership with Microsoft!

Komentar