5 Examples to Use This Port Scanning Tool (2)

In the area of ​​computer security, specifically at the network level, there are many interesting tools to assess whether a system is vulnerable or not. The result produced by this type of tools can be used by malicious people for the most diverse purposes or by system owners or administrators to improve the security of their systems.

One of the tools that allows you to easily identify systems and services is NMAP. See 5 more examples of how to use this tool.

As mentioned, NMAP is a tool used to recognize systems and services in a data network. This tool is one of the most popular in this segment and the options it offers are very varied. If you are curious to know how to use this tool, today we are going to leave you with some more examples (you can see the first part here).

#6 – Scan UDP logical ports

As we know, on a machine there are 65536 logical TCP ports and 65536 logical UDP ports. To scan the UDP ports, use the arguments -sU.

#7 – Know how to scan all logical ports

If you need to scan all logical ports, you can use the -p- argument.

#8 – Know the version of a particular service

To know the version of a certain service that is running on a remote machine, use the option -sV. For this reason, we use the following nomenclature: nmap -sv -O -p

Source: Pplware by pplware.sapo.pt.

*The article has been translated based on the content of Pplware by pplware.sapo.pt. If there is any problem regarding the content, copyright, please leave a report below the article. We will try to process as quickly as possible to protect the rights of the author. Thank you very much!

*We just want readers to access information more quickly and easily with other multilingual content, instead of information only available in a certain language.

*We always respect the copyright of the content of the author and always include the original link of the source article.If the author disagrees, just leave the report below the article, the article will be edited or deleted at the request of the author. Thanks very much! Best regards!