We have now successfully written our first Nmap script, and launched a variety of scans against a plethora of different target types (and defenses). However, scanning a host is only a small part of the full power of the Nmap suite.
In addition to creating a powerful scanning tool and the NSE, Nmap developers have included several additional tools—including Ncrack, Nping, Ncat, and Ndiff—into default install bundles of Nmap. These tools can help analyze existing scans, pivot to other hosts, transfer files, or compare scan results over time.
In this chapter, we will cover the following topics:
Attacking services with Ncrack
Host detection with Nping
File transfers and backdoors with Ncat
Comparing Nmap results with Ndiff