Of course, what we are doing with nmap so far is only the tip of the iceberg. Nmap allows for customization of scans to a very high degree. Let's look at a few options.
To execute a NULL scan, select NULL from the list in the nmap window in the NetHunter app and enter the target IP address:
The menu and options available within the Nmap app on Kali NetHunter
On this line, you can enter the ports you wish to scan in different ways, such as a range; we are using the -p
switch to indicate we are scanning specific ports, and then we follow it with ports 21
, 22
, and 45
and the IP address of the target:
21,22,45
Another option is to scan a range of ports, for example, ports 1
to 100
:
1-100
Want to scan specific ports and detect the OS and services? Nmap would send a series of both TCP and UDP datagrams to the target device; each response is carefully analyzed. The results would be compared with the Nmap OS database, which consists of over 2,600 OS fingerprints. For more information...