8 important nmap commands in Kali Linux with Example

8 important nmap commands in Kali Linux with Example

MODULE 5:- Scanning Network and Vulnerability

    1. Introduction of port Scanning – Penetration testing
    2. TCP IP header flags list
    3. Examples of Network Scanning for Live Host by Kali Linux
    4. important nmap commands in Kali Linux with Example
    5. Techniques of Nmap port scanner – Scanning
    6. Nmap Timing Templates – You should know
    7. Nmap options for Firewall IDS evasion in Kali Linux
    8. commands to save Nmap output to file
    9. Nmap Scripts in Kali Linux
    10. 10 best open port checker Or Scanner
    11. 10 hping3 examples for scanning network in Kali Linux
    12. How to Install Nessus on Kali Linux 2.0 step by step
    13. Nessus scan policies and report Tutorial for beginner
    14. Nessus Vulnerability Scanner Tutorial For beginner

8 important nmap commands in Kali Linux with Example

Today I am going to talk about 8 important Nmap commands in Kali Linux with Example after reading this article, you will be able to understand how to use namp commands and how to scan the network!. you can check another post related nmap 4 Examples of Network Scanning for Live Host by Kali Linux

Use Switches like nmap -sO,nmap -sS,nmap -p,nmap -T4,nmap -sF

Oh yes!  you are seeking what is switches? 

It has lots of sub tools. that is excuted by using switch. Like if we are going to scan particular IP address and we run command nmap 192.168.56.102 (Target IP Address) It scan network through default options. When we specify any switch like nmap -v  the process will be verbose.

One more question how will you see available options?

It is very simple to run following command to see available options and how can you use them!

nmap -h OR namp –help

Nmap command 1: nmap -T4 for timing

In scanning process, nmap sends packets to the target machine within the particular time period (interval). If you want to decrease or increase this time period then you can use nmap -T switch. but -T option required an attribute, means you should use 1,2,3,4 as per requirement T4 has fast speed then T1, T2 and T4.

nmap -T4 192.168.56.102 

Timing scan nmap -T4 -v

Nmap command 2: nmap –sS for TCP SYN scan

It is required privilege access and identifies TCP ports. The TCP SYN Scan implements common method to identify open ports without completing Three way handshake process. When the open port is detected, the TCP handshake reset before completing. So this scanning also known as Half Open scanning.

nmap -sS 192.168.56.102

TCP SYN Scan nmap –sS

Nmap command 3: nmap -sF for FIN Scan

FIN scan sends packet with FIN flag to the target machine, so these frames are unusual because the they sent to destination before completing Three way handshaking process. If the tcp session is not active,  it means that port is formally closed. If the particular port is closed on the target machine it reverse RST packet in the response of FIN Scan.

nmap -sF 192.168.56.102 

FIN Scan nmap -sF

IP Protocol Scan nmap –sO

IP Protocol scan has miner difference for other nmap scans. It is searching for additional IP protocols used by Target machine for example ICMP, TCP and UDP. If you scans Router, may be detected additional IP protocols like EGP or IGP.

nmap -sO 192.168.56.102

Nmap command 4: nmap –v for Verbose Mode

Nmap’s verbose mode provides the feature of obtaining additional detail in the scan output. The verbose mode doesn’t change what occurs during the scan, it only changes the amount of information that nmap displays on its output.

nmap -v -sF

Nmap command 5: nmap -p for Port Scan

Nmap mostly used for scanning ports, by default it scans all ports but you can scan single, multiple or within range protocols.

Single port scan: namp -p21 192.168.56.102

Multiple scan ports: namp -p21, 80, 443 192.168.56.102

scan Ports Range: nmap -p20-1000

Ports Scan nmap -p

Nmap command 6: Nmap –PE for ICMP Echo Request Ping

The ICMP echo request ping sends an ICMP echo request to the target machine’s IP address. In the normal type of ICMP echo request is sent combination TCP and ACK ping.With the option –PE , the ICMP echo request can be specified as the nmap ping method without pairing TCP ACK ping.

nmap -PE 192.168.56.102

ICMP Echo Request Ping Nmap –PE

Nmap command 7: nmap –PA for TCP ACP Ping 

Instead of using the default option of both an ICMP echo request and a TCP ACK, the –PA option sends a TCP ACK and forgoes any ICMP echo requests. This is a good alternative when the use of ICMP is not applicable because of packet filtering or firewalls.

nmap -PA 192.168.56.102

TCP ACP Ping nmap –PA

SOURCE

Top 10 tools for hacking wirelessly that should protect yourself from.

MODULE 14:- WiFi Hacking and Security

  1. 5 Ways to show my saved wifi password in Windows 10
  2. KickThemOut- how to kick someone off your wifi
  3. 5 Tips, how to secure wifi from hacking – full guide
  4. Top 5 Wifi Hacking software for Linux OS
  5. Top 10 tools for hacking wirelessly that should protect yourself from

802-11ac-hackingGather around tech folks or up n coming tech gods. Today we shall talk about TOP 10 TOOLS FOR HACKING WIRELESSLY 

First of, let’s start with what is wireless. Wireless is anything  that doesn’t have or need a wire. What?? You thought the were getting a long convoluted explanation of the radio waves that are involved, that you need the knowledge of WEP and WAP before even digging into the meat of wireless hacking. At this day n age where technology governs all, the gullibility of people is also on the rise, which in turn gives rise to select few culprits sticking their dingles in other peoples’ systems and giving it a virus. So now the only way we have, the only solution is to know about these things beforehand. A great man ones said”To fight thy enemy you have to know thy enemy“…or something.

Let’s start first with some key abbreviations

  • WEP:  Wired Equivalent Privacy
  • WPA:  Wi-Fi Protected Access

The above to are the basic security protocols for Wifi-Lan. WEP is the earlier one, it is one weak ass protocol that can be hacked within minutes. So now we got WPA, an evolved and more secure version. To hack this protocol below are the hacking tools used and these tools are used wirelessly so.

  • AirCrack: One of the most popular hacking tools, AirCrack can be used for WEP and WPA cracking. They way it works is it captures packets of data transmission first, then when enough packets are gathered, password cracking begins. It follows the basic rule of”the more the merrier” meaning, the more packets, the successful the hack.
  • AirSnort: Used for decrypting WEP protocol, AirSnort is a free tool. This tool comes with Linux and windows. Don’t wonder why it’s free. It’s free because WEP protocols as said, are not strong enough. Works in the same way as AirCrack.
  • Cain n Able: Popular for password cracking,this tool intercepts data transmission and tries to deduce password using brute-force attack. In other words, domestic violence against the system security is involved.
  • Kismet: This is a personal one. Most of the websites use A-kismet to keep themselves secure from this tool. Kismet is a sniffer or to be more exact a network sniffer. it goes around collecting packets passively to deduce what type of network the packets belong to.
  • Netstumbler: For its namesake, let’s say that this tool is one of those street pickpockets that “accidentally stumble” on you and then grab your purse and leave. Netstumbler is a popular windows tool to find open wireless access points. Its’ used to detect network configurations and unauthorized access to networks. The good thing  for you about this system is that it’s easily detected.
  • inSSIDer : The most popular open source software on the internet. its job is to find open Wifi access points, tracking the GPS log, and the signal strength of Wifi.
  • AirJack : This tool injects fabricated packets into the network. It is used by the hackers to do a DDoS(Denial Of Service) attack.
  • WepAttack : An open source Linux tool. This tool uses an open dictionary attack , comparing the key with a million keys in its dictionary to find a working one.
  • OmniPeek : Its a workable packet sniffer and network analyzer tool. A commercial tool, it is used exclusively for windows and used to capture Wifi traffic and further analyze it.
  • CloudCracker : With a huge dictionary of 300 million keys, the CloudCracker is used to hack into WAP protected wifi networks.

Everything has good and evil. Above tools, whereas are used for Hacking wirelessly, are also used by penetration testers to do a security check on client networks. Wireless cracking is not as difficult for the masses as it used to be. So now a call to action is needed to be made to help secure your network and your future.

Download Kali Linux 32 or 64 bit ISO file free

Download Kali Linux Images Securely

Download Kali Linux 32 or 64 bit Image from Official Website

Kali Linux is a debian based Linux distribution launched at 13th March 2013. This Operating system widely used for Penetration Testing. It has bunch of tools used for penetration testing, Security auditing, network testing, wireless security, Forensics etc. There are more than 4oo tools are available on it repository. Kali Linux Operating system is always free as per offensive security’s announcement. It’s 32 bit and 64 bit ISO file, VMware file, and arm file are available for download.  You can download it by torrent too.

[button color=”red” size=”medium” link=”https://www.kali.org/downloads/” icon=”” target=”false”]Download Kali Linux 32 or 64 bit Image[/button]

 

[button color=”blue” size=”medium” link=”https://www.youtube.com/watch?v=cItLLZo3-sk” icon=”” target=”false”]Video Tutorial[/button]

 

How to install virtualbox guest additions in Kali Linux 2.0

how to install virtualbox guest additions in kali linux

MODULE :- LAB SETUP

  1. You must know Kali Linux requirements before install on System
  2. How to install Kali Linux on VirtualBox – Full guide step by step
  3. How to install virtualbox guest additions in Kali Linux 2.0
  4. 10 steps for Setting Up metasploitable 2 VM – guide

Install Guest additions

Guest additions are installed inside the guest operating System, it consists device drivers and applications to optimize better performance for guest Operating Systems.

Guest additions have following features:

  • Mouse pointer integration
  • Shared folders
  • Better Video support
  • Seamless windows
  • Generic host/guest communication channels
  • Time synchronization
  • shared clipboard

So install guest additions inside virtual machines and enjoy better performance.

[button color=”orange” size=”medium” link=”https://www.youtube.com/watch?v=ghTOejOlYXE” icon=”” target=”false”]Video Tutorial [/button]

 

How to install kali linux 2.0 on virtual box

Install Kali linux 2.0 on Virtual Box Step by Step

Install Kali Linux on virtual box and create virtual machine for Penetration testing, the basic requirement installed virtual box and Kali Linux ISO image. Kali Linux ISO file is available on it’s official website.

[button color=”blue” size=”small” link=”https://www.virtualbox.org/wiki/Downloads” icon=”” target=”true”]Download Virtual Box[/button] [button color=”blue” size=”small” link=”https://www.kali.org/downloads/” icon=”” target=”true”]Download Kali Linux[/button]

When you acquire executable file of Virtual box install it.

 Install Virtual Box on Window Machine

When virtual box installation will be finish run virtual box and create new virtual machine for Kali Linux. At the time of creating virtual machine be aware and follow every steps, because your wrong move can make installation failed.

 

[button color=”orange” size=”medium” link=”https://www.youtube.com/watch?v=YzWERO6sRUM” icon=”” target=”false”]Video Tutorial[/button]

 

Add Kali Linux git repository in source list

Add Kali Linux git source repository

After install Kali Linux the next step how to update and upgrade it. Repository play an important role to update and upgrade Kali Linux. Git Source Repository is a Server store all updated verified tools for Kali Linux.  We need to add these servers addresses in source.list file, locate /etc/apt/.  As we know Kali Linux is a Debian based Operating System, so all the Debian package can be installed on it. but some package may be cause of crash the Kali Linux due to incompatibility. So it is important add only officially source list in file.

Step 1: Go to the Official website HERE

Step 2: Copy the source lists ( Regular Repositories and Source repositories) and add into /etc/apt/source.list file

Regular repositories

On a standard, clean install of Kali Linux, you should have the following two entries present in/etc/apt/sources.list:

deb http://http.kali.org/kali sana main non-free contrib
deb http://security.kali.org/kali-security sana/updates main contrib non-free

You can find a list of official Kali Linux mirrors here.

Source repositories

In case you require source packages, you might also want to add the following repositories as well:

deb-src http://http.kali.org/kali sana main non-free contrib
deb-src http://security.kali.org/kali-security sana/updates main contrib non-free

 

Video Tutorial of Adding Repository in Kali Linux 2

 

Download free software gnome-do for app launcher in Kali Linux

Install Gnome-do app launcher to speed up Kali Linux

Gnome-do is app launcher for Linux, Open the gnome-do and enter the name of software or pakcage and hit enter, typed app will be launched. By this utility you can speed up your working speed on Linux environment. If you want to install this utility on Linux just type following commands:

apt-get update 

or 

sudo apt-get update

apt-get install gnome-do

or 

sudo apt-get install gnome-do

[button color=”blue” size=”big” link=”https://www.youtube.com/watch?v=W1cp1F-ERtE” icon=”” target=”true”]Video Tutorial[/button]

 

Multiple Terminal by Terminal Emulator Terminator

Terminator Multiple terminals in one Window

Multiple Terminal by Terminal Emulator Terminator

Terminator is a terminal emulator used for multiple terminals on Single screen or Window. If you are planning to work on multiple terminals on Single screen in Linux environment then install terminator. Terminator’s code has been added on Kali Linux repository so you can install by simple commands:

apt-get update

apt-get install terminator

 

[button color=”blue” size=”medium” link=”https://www.youtube.com/watch?v=xNlV7hvGXac” icon=”” target=”true”]Video Tutorial[/button]

Install Virtualbox Ubuntu or Kali Linux

How to Install Virtual Box Kali Linux 2.0 SANA

Install Virtualbox Ubuntu or Kali Linux

Virtual box is free software used to create virtual machines inside Window or Linux Operating System. Virtual Box is available to free download  on its official Website, and it is added on ubuntu or Kali Linux repository with latest version. So you can install virtualbox Ubuntu by using apt-get install or sudo apt-get install commands on Ubuntu.

Commands are:

#apt-get update

OR

$sudo apt-get update

#apt-get install virtualbox

OR

$sudo apt-get install virtualbox 

 

Install Kali Linux on Hard drive with Full disk Encryption

Kali Linux 2.0 Encrypted Installation on Disk

MODULE 3:- Basics of Kali Linux

  1. Install Kali Linux on Hard drive with Full disk Encryption
  2. How to create Kali Linux bootable USB live in windows 10
  3. 20 basics about how to use Kali Linux
  4. 6 steps to change Kali Linux IP address (Easy)
  5. How to Add Kali Linux repository – With pictures
  6. How to update and upgrade Kali Linux to 2017.1
  7. apt-get package handling utility in Kali Linux
  8. How to use Linux debian package manager “dpkg”
  9. How to use Kali Linux SSH Server and client
  10. Start Restart Apache2 Web Server In Kali Linux

Install Kali Linux with full disk encryption

At times, we have sensitive data we would prefer to encrypt files using best full disk encryption method. With the Kali Linux installer, you can initiate a open source encryption software LVM encrypted install on either hard drive or USB drives. Installation on Laptop or Computer is very similar to a “Normal Kali Linux install” with the exception of choosing an Encrypted LVM partition during the installation process.

Video Tutorial: