Enjoy the video on Nmap's uses for Penetration Testing! Please smash the like button and subscribe if you enjoyed the video. Chapters: 0:00 Intro 1:38 Rules of Engagement 2:26 Network Verification 2:55 Layer 2 Host Discovery 4:27 IP list Creation 4:50 Layer 3 Host Discovery 6:30 Layer 4 Host Discovery 7:45 Port States 8:59 Default Nmap Scans 10:50 Specific Port Scan 12:43 Filtered Port Scan 14:15 UDP Port Scan 15:43 Service and Version Enumeration Scan 18:00 Operating System Discovery Scan 19:40 Detection Avoidance - Timing of Scans 21:34 Detection Avoidance - Decoy Scan 23:06 Detection Avoidance - Random Host Scan 24:17 Detection Avoidance - Spoofing Mac Address 25:31 Detection Avoidance - Fragmented Scan 27:06 Review of Nmap Script Sources 28:50 SMB Vulnerability Scan 30:35 FTP Vulnerability Scan 31:26 VULN Vulnerability Scan 34:40 Metasploit Vulnerability Exploitation 37:15 Defensive Tactics 37:52 Closing Thoughts Please Like and Subscribe by clicking here: studio.ru-vid.com/show-UC39GKRsNps38x7UzydcOZ9w Follow me on Twitter: twitter.com/NielsenNTWKING
Hello Nielsen, thanks for the video! I have some questions for you: 1) My question is this, how do you close those ports Or How do you stop them from being exploited! 2) Do you have Nmap on Parrot OS ? If yes, will the above commands work? Thanks in anticipation!
Fantastic video! You did a great job of breaking down some of the functions of NMAP and addressing that portion of us that aren’t completely new, but also aren’t professionals with 5 or 10 years+ of experience. Please keep putting out videos. You got a subscriber just from watching this one video!
I've been looking for a tutorial on network discovery but most of them don't explain very well or don't go in a lot of depth. This video is amazing and i leanred a lot from this. Keep up the good work.
Man you explained everything clearly thank you, so much, i loved that opening question " are you ready to take your pentest skills to a next level" 🔥🔥🔥❤🔥❤🔥
I am new to tech world and I have been using nmap base on the books I read but I never had a better practical understanding of nmpa. You cant imagine how happy I am but I will say a big thank you for this teach here. You are appreciate
I have to say that after watching three of your videos I learned more than I have in the last month on a paid subscription of hack the box !! You are a tremendous teacher and I can’t thank you enough for your time and sharing your knowledge. There is only ONE thing that would be helpful…. If you put a list of the commands you used in the comments so we can copy and paste them into a text file it would be perfect!!! I know moving forward I will have to return to this video many times to get the syntax right Thank again!!!!
You're very kind, I really appreciate you comments. I will see if I can remember to add the commands, at least the important ones, in the comments. Take care.
i literally knew nothing about networks or cybersecurity until three hours ago, and now I at least know a thing or another about scanning. Thanks for the amazing video! going to enjoy metasploit now
@@NNAdmin what’s not to like? Everyone seems to know the basics ( like with wireshark) but to harness the power it actually holds, only the few know how to wield it. ( oh and yes, I am one of those too 😉) perhaps a collaboration one day, I can see that.
This video is amazing you are excellent at teaching, I can’t thank you enough for taking the time to create such a complete and detailed tutorial, you got a new sub
Hi. I'm a little bit late to the party but I'll ask my question anyway. What does the -PR switch do? I couldn't find anything in the official Nmap documentation about a -PR switch! Also, thanks for great content. Keep it up
PR = ping scan, and is used for host discovery. The switch tells Nmap to send an ICMP echo request (ping) to the target to determine if it's online or not. It doesn't perform any port scanning.
Thank you very much gor your video tutorials on Penetration Testing. You are wonderful ! Your videos are vety clear, well-designed at the same time. I would appreciation you if you could provide some information on how to make dych videos! I mean if you could make a video on how to create a video like yours!
Download Metasploitable and install it in an offline lab. Metasploitable it's a server that comes with vulnerabilities or just misconfigure smb, or certificates, or whatever on a machine inside a lab.
Lowercase flags are for specific options, like -sS for TCP connect scan or -sT for TCP SYN scan. Uppercase flags, like -A for OS detection or -O for version detection, enable broader functionalities during the scan.
I have a question for anyone who wanna help When I run service and version scan I get a warning message "retransmission cap hit (10)" Still didn't find any solution online tho I'll be looking any help is gonna be well received
Hi, The message "retransmission cap hit (10)" in the context of Nmap scans indicates that Nmap sent a certain number of retransmissions a target and reached a predefined cap of 10 retransmissions without receiving a response. This can happen for various reasons, and there are a few potential explanations and solutions: Use the --scan-delay option to add a delay between probes: nmap --scan-delay 1s Use the --max-retries option to limit the number of retries: nmap --max-retries 2 Use a combination of --max-retries and --max-scan-delay: nmap --max-retries 1 --max-scan-delay 10s Use nmap -T0 to modify the timing. Note you can use T0 thru T5 See if that helps, otherwise it may be the firewall on the device you're scanning.
There's a million ways to get images of an iPad, including the common ones like airdrop, SMS, email, etc. Or mounting the device as a external drive....I am not sure why you would be looking for a script or using FTP....
Hello Nielsen i want to ask You about how did You achieved whole environment on video to practice all the things. I mean if there is somewhere video about configurating other VM's OS in Network with open ports etc, i installed Kali-Linux and also 4 other Windows VMs but during scanning all ports are closed/filtered. I tried to find video about it on Your channel but without success. Thanks for reply in advantage! I support also Your channel soon because i can learn alot of things here
Hello and Welcome! I plan to create a video on how to setup a lab, similar to mine for testing in the near future. It will be sooner than later, after my next video that I have already started.