How to install Nmap 7.01 and to use on Linux Mint 18.3

To install Nmap 7.01 and to use on Linux Mint 18.3

The Nmap ( Network Mapper) is an open source and a very versatile tool for Linux system/network administrators. Nmap is used for exploring networks; perform security scans, network audit and finding open ports on a remote machine. It scans for Live hosts, Operating systems, packet filters and open ports running on remote hosts. Installing Nmap 7.01 is so simple and this tutorial covers the ground on the same process. 

 

Installing Nmap

Most of the today’s Linux distributions like Red Hat, CentOS, Fedoro, Debian, and Ubuntu have included Nmap in their default package management repositories called Yum and APT. Run the following command to install Nmap.

linuxhelp ~ # apt-get install nmap
Reading package lists... Done
Building dependency tree       
Reading state information... Done
The following additional packages will be installed:
  liblinear3 lua-lpeg
Suggested packages:
  liblinear-tools liblinear-dev
Recommended packages:
  ndiff
The following NEW packages will be installed:
  liblinear3 lua-lpeg nmap
0 upgraded, 3 newly installed, 0 to remove and 174 not upgraded. 
.
.
Processing triggers for libc-bin (2.23-0ubuntu9) ...
Processing triggers for man-db (2.7.5-1) ...
Setting up liblinear3:amd64 (2.1.0+dfsg-1) ...
Setting up lua-lpeg:amd64 (0.12.2-1) ...
Setting up nmap (7.01-2ubuntu2) ...
Processing triggers for libc-bin (2.23-0ubuntu9) ...

 

 

Now that Nmap is installed, we’ll see a wide range of its usability. First, let's scan our target for vulnerabilities in the following manner. 

linuxhelp ~ # nmap -Pn --script vuln 192.168.7.232 
Starting Nmap 7.01 ( https://nmap.org ) at 2018-02-18 04:11 IST
Pre-scan script results:
| broadcast-avahi-dos: 
|   Discovered hosts:
|     192.168.7.134
|     192.168.7.147
|     192.168.7.130
|     192.168.7.144
|     192.168.7.141
|     192.168.7.138
.
.
|   After NULL UDP avahi packet DoS (CVE-2011-1002).
|_  Hosts are all up (not vulnerable).
Nmap scan report for 192.168.7.232
Host is up (0.00016s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE
22/tcp  open  ssh
111/tcp open  rpcbind
MAC Address: 00:0C:29:7F:EC:FD (VMware)

Nmap done: 1 IP address (1 host up) scanned in 38.94 seconds

After your scan completes you can review Nmap’s output to find what vulnerabilities were found. The findings along with applicable CVEs and links to any exploits that exist in Offensive Security's Exploit Database are listed. 

 

You can also use the nmap command in the following manner to check whether the target is vulnerable to DoS. 

linuxhelp ~ # nmap --script dos -Pn 192.168.7.232

Starting Nmap 7.01 ( https://nmap.org ) at 2018-02-18 04:14 IST
Pre-scan script results:
| broadcast-avahi-dos: 
|   Discovered hosts:
|     192.168.7.142
|     192.168.7.147
|     192.168.7.144
|     192.168.7.121
|     192.168.7.141
.
.
|     192.168.7.134
|     192.168.7.129
|   After NULL UDP avahi packet DoS (CVE-2011-1002).
|_  Hosts are all up (not vulnerable).
Nmap scan report for 192.168.7.232
Host is up (0.00018s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE
22/tcp  open  ssh
111/tcp open  rpcbind
MAC Address: 00:0C:29:7F:EC:FD (VMware)

Nmap done: 1 IP address (1 host up) scanned in 40.17 seconds

 

You can also use nmap command to scan using IP address. 

linuxhelp ~ # nmap 192.168.7.232
Starting Nmap 7.01 ( https://nmap.org ) at 2018-02-18 04:17 IST
Nmap scan report for 192.168.7.232
Host is up (0.00012s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE
22/tcp  open  ssh
111/tcp open  rpcbind
MAC Address: 00:0C:29:7F:EC:FD (VMware)

Nmap done: 1 IP address (1 host up) scanned in 1.55 seconds

 

 

Also, you can scan OS information and Traceroute in the following manner. 

linuxhelp ~ # nmap -A 192.168.7.232

Starting Nmap 7.01 ( https://nmap.org ) at 2018-02-18 04:18 IST
Nmap scan report for 192.168.7.232
Host is up (0.00030s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE VERSION
22/tcp  open  ssh     OpenSSH 7.4 (protocol 2.0)
| ssh-hostkey: 
|   2048 63:bf:4e:a0:11:14:59:ff:19:99:74:ae:45:ce:c0:18 (RSA)
|_  256 19:29:9e:3b:50:57:14:37:d2:3f:7e:49:c1:b4:d4:d9 (ECDSA)
111/tcp open  rpcbind 2-4 (RPC #100000)
| rpcinfo: 
|   program version   port/proto  service
|   100000  2,3,4        111/tcp  rpcbind
|_  100000  2,3,4        111/udp  rpcbind
MAC Address: 00:0C:29:7F:EC:FD (VMware)
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.0
Network Distance: 1 hop

TRACEROUTE
HOP RTT     ADDRESS
1   0.29 ms 192.168.7.232

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.94 seconds


You can also enable OS detection with Nmap, all you need to do is use –O option.  “-osscan-guess” also helps to discover OS information. 

linuxhelp ~ # nmap -O 192.168.7.232

Starting Nmap 7.01 ( https://nmap.org ) at 2018-02-18 04:20 IST
Nmap scan report for 192.168.7.232
Host is up (0.00024s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE
22/tcp  open  ssh
111/tcp open  rpcbind
MAC Address: 00:0C:29:7F:EC:FD (VMware)
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.0
Network Distance: 1 hop

OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 3.60 seconds

 

If you want to find the version of Nmap you can run the following command. 

linuxhelp ~ # nmap -V

Nmap version 7.01 ( https://nmap.org )
Platform: x86_64-pc-linux-gnu
Compiled with: liblua-5.2.4 openssl-1.0.2g libpcre-8.38 libpcap-1.7.4 nmap-libdnet-1.12 ipv6
Compiled without:
Available nsock engines: epoll poll select

 

You can also print ost interfaces and routes by making using of the following command. 

linuxhelp ~ # nmap --iflist

Starting Nmap 7.01 ( https://nmap.org ) at 2018-02-18 04:22 IST
************************INTERFACES************************
DEV   (SHORT) IP/MASK                      TYPE     UP MTU   MAC
ens33 (ens33) 192.168.7.234/24             ethernet up 1500  00:0C:29:F8:F9:81
ens33 (ens33) fe80::19ae:fc6a:5310:718b/64 ethernet up 1500  00:0C:29:F8:F9:81
lo    (lo)    127.0.0.1/8                  loopback up 65536
lo    (lo)    ::1/128                      loopback up 65536

**************************ROUTES**************************
DST/MASK                      DEV   METRIC GATEWAY
192.168.7.0/24                ens33 100
169.254.0.0/16                ens33 1000
0.0.0.0/0                     ens33 100    192.168.7.1
::1/128                       lo    0
fe80::19ae:fc6a:5310:718b/128 lo    0
fe80::/64                     ens33 256
ff00::/8                      ens33 256

 

You can also perform a TCP null scan to fool a firewall. 

linuxhelp ~ # nmap -sN 192.168.7.232

Starting Nmap 7.01 ( https://nmap.org ) at 2018-02-18 04:23 IST
Nmap scan report for 192.168.7.232
Host is up (0.00032s latency).
Not shown: 998 closed ports
PORT    STATE         SERVICE
22/tcp  open|filtered ssh
111/tcp open|filtered rpcbind
MAC Address: 00:0C:29:7F:EC:FD (VMware)

Nmap done: 1 IP address (1 host up) scanned in 95.17 seconds

With this, this tutorial on how to install and use Nmap on Linux Mint comes to an end. 
 


Thank you! for using Linux Help.

You find this tutorial helpful? Share with your friends to keep it alive.
For more help topics browse our website www.linuxhelp.com
Be the first to comment, we value your suggestions. For further queries please comment below.

Tags: Command Line Tools Linux Mint nmap
user image Author :  Jackson