Enjoy the video on Nmap's uses for Penetration Testing! Please smash the like button and subscribe if you enjoyed the video. Chapters: 0:00 Intro 1:38 Rules of Engagement 2:26 Network Verification 2:55 Layer 2 Host Discovery 4:27 IP list Creation 4:50 Layer 3 Host Discovery 6:30 Layer 4 Host Discovery 7:45 Port States 8:59 Default Nmap Scans 10:50 Specific Port Scan 12:43 Filtered Port Scan 14:15 UDP Port Scan 15:43 Service and Version Enumeration Scan 18:00 Operating System Discovery Scan 19:40 Detection Avoidance - Timing of Scans 21:34 Detection Avoidance - Decoy Scan 23:06 Detection Avoidance - Random Host Scan 24:17 Detection Avoidance - Spoofing Mac Address 25:31 Detection Avoidance - Fragmented Scan 27:06 Review of Nmap Script Sources 28:50 SMB Vulnerability Scan 30:35 FTP Vulnerability Scan 31:26 VULN Vulnerability Scan 34:40 Metasploit Vulnerability Exploitation 37:15 Defensive Tactics 37:52 Closing Thoughts Please Like and Subscribe by clicking here: studio.th-cam.com/channels/39GKRsNps38x7UzydcOZ9w.html Follow me on Twitter: twitter.com/NielsenNTWKING
Hello Nielsen, thanks for the video! I have some questions for you: 1) My question is this, how do you close those ports Or How do you stop them from being exploited! 2) Do you have Nmap on Parrot OS ? If yes, will the above commands work? Thanks in anticipation!
I've been looking for a tutorial on network discovery but most of them don't explain very well or don't go in a lot of depth. This video is amazing and i leanred a lot from this. Keep up the good work.
Fantastic video! You did a great job of breaking down some of the functions of NMAP and addressing that portion of us that aren’t completely new, but also aren’t professionals with 5 or 10 years+ of experience. Please keep putting out videos. You got a subscriber just from watching this one video!
I am new to tech world and I have been using nmap base on the books I read but I never had a better practical understanding of nmpa. You cant imagine how happy I am but I will say a big thank you for this teach here. You are appreciate
Man you explained everything clearly thank you, so much, i loved that opening question " are you ready to take your pentest skills to a next level" 🔥🔥🔥❤🔥❤🔥
@@NNAdmin what’s not to like? Everyone seems to know the basics ( like with wireshark) but to harness the power it actually holds, only the few know how to wield it. ( oh and yes, I am one of those too 😉) perhaps a collaboration one day, I can see that.
I have to say that after watching three of your videos I learned more than I have in the last month on a paid subscription of hack the box !! You are a tremendous teacher and I can’t thank you enough for your time and sharing your knowledge. There is only ONE thing that would be helpful…. If you put a list of the commands you used in the comments so we can copy and paste them into a text file it would be perfect!!! I know moving forward I will have to return to this video many times to get the syntax right Thank again!!!!
You're very kind, I really appreciate you comments. I will see if I can remember to add the commands, at least the important ones, in the comments. Take care.
i literally knew nothing about networks or cybersecurity until three hours ago, and now I at least know a thing or another about scanning. Thanks for the amazing video! going to enjoy metasploit now
This video is amazing you are excellent at teaching, I can’t thank you enough for taking the time to create such a complete and detailed tutorial, you got a new sub
Thank you very much gor your video tutorials on Penetration Testing. You are wonderful ! Your videos are vety clear, well-designed at the same time. I would appreciation you if you could provide some information on how to make dych videos! I mean if you could make a video on how to create a video like yours!
Hi. I'm a little bit late to the party but I'll ask my question anyway. What does the -PR switch do? I couldn't find anything in the official Nmap documentation about a -PR switch! Also, thanks for great content. Keep it up
PR = ping scan, and is used for host discovery. The switch tells Nmap to send an ICMP echo request (ping) to the target to determine if it's online or not. It doesn't perform any port scanning.
Lowercase flags are for specific options, like -sS for TCP connect scan or -sT for TCP SYN scan. Uppercase flags, like -A for OS detection or -O for version detection, enable broader functionalities during the scan.
Download Metasploitable and install it in an offline lab. Metasploitable it's a server that comes with vulnerabilities or just misconfigure smb, or certificates, or whatever on a machine inside a lab.
There's a million ways to get images of an iPad, including the common ones like airdrop, SMS, email, etc. Or mounting the device as a external drive....I am not sure why you would be looking for a script or using FTP....
I have a question for anyone who wanna help When I run service and version scan I get a warning message "retransmission cap hit (10)" Still didn't find any solution online tho I'll be looking any help is gonna be well received
Hi, The message "retransmission cap hit (10)" in the context of Nmap scans indicates that Nmap sent a certain number of retransmissions a target and reached a predefined cap of 10 retransmissions without receiving a response. This can happen for various reasons, and there are a few potential explanations and solutions: Use the --scan-delay option to add a delay between probes: nmap --scan-delay 1s Use the --max-retries option to limit the number of retries: nmap --max-retries 2 Use a combination of --max-retries and --max-scan-delay: nmap --max-retries 1 --max-scan-delay 10s Use nmap -T0 to modify the timing. Note you can use T0 thru T5 See if that helps, otherwise it may be the firewall on the device you're scanning.
Hello Nielsen i want to ask You about how did You achieved whole environment on video to practice all the things. I mean if there is somewhere video about configurating other VM's OS in Network with open ports etc, i installed Kali-Linux and also 4 other Windows VMs but during scanning all ports are closed/filtered. I tried to find video about it on Your channel but without success. Thanks for reply in advantage! I support also Your channel soon because i can learn alot of things here
Hello and Welcome! I plan to create a video on how to setup a lab, similar to mine for testing in the near future. It will be sooner than later, after my next video that I have already started.
Enjoy the video on Nmap's uses for Penetration Testing! Please smash the like button and subscribe if you enjoyed the video.
Chapters:
0:00 Intro
1:38 Rules of Engagement
2:26 Network Verification
2:55 Layer 2 Host Discovery
4:27 IP list Creation
4:50 Layer 3 Host Discovery
6:30 Layer 4 Host Discovery
7:45 Port States
8:59 Default Nmap Scans
10:50 Specific Port Scan
12:43 Filtered Port Scan
14:15 UDP Port Scan
15:43 Service and Version Enumeration Scan
18:00 Operating System Discovery Scan
19:40 Detection Avoidance - Timing of Scans
21:34 Detection Avoidance - Decoy Scan
23:06 Detection Avoidance - Random Host Scan
24:17 Detection Avoidance - Spoofing Mac Address
25:31 Detection Avoidance - Fragmented Scan
27:06 Review of Nmap Script Sources
28:50 SMB Vulnerability Scan
30:35 FTP Vulnerability Scan
31:26 VULN Vulnerability Scan
34:40 Metasploit Vulnerability Exploitation
37:15 Defensive Tactics
37:52 Closing Thoughts
Please Like and Subscribe by clicking here: studio.th-cam.com/channels/39GKRsNps38x7UzydcOZ9w.html
Follow me on Twitter: twitter.com/NielsenNTWKING
Liked and i am already sudbd
Hello Nielsen, thanks for the video!
I have some questions for you:
1) My question is this, how do you close those ports Or How do you stop them from being exploited!
2) Do you have Nmap on Parrot OS ? If yes, will the above commands work?
Thanks in anticipation!
indeed ser!
tYvM
kangs
I've been looking for a tutorial on network discovery but most of them don't explain very well or don't go in a lot of depth. This video is amazing and i leanred a lot from this. Keep up the good work.
Glad I could help!
Fantastic video! You did a great job of breaking down some of the functions of NMAP and addressing that portion of us that aren’t completely new, but also aren’t professionals with 5 or 10 years+ of experience. Please keep putting out videos. You got a subscriber just from watching this one video!
Glad it was helpful, and thanks for the kind words. :)
This channel is a hidden gem wow. Thank you so much.
Wow, thank you for the kind words!
I am new to tech world and I have been using nmap base on the books I read but I never had a better practical understanding of nmpa. You cant imagine how happy I am but I will say a big thank you for this teach here. You are appreciate
Glad it was helpful!
just stumbled upon you... way better than most tutors on youtube keep it up bro u got a daily watcher here
I appreciate that!
Excellent demonstration! Highly recommend this for beginners who are new to Kali and nmap
Glad it was helpful!
Thanks. I just started learning pen testing and this video has been the most informative I have come across so far 👍
Man you explained everything clearly thank you, so much, i loved that opening question " are you ready to take your pentest skills to a next level" 🔥🔥🔥❤🔥❤🔥
Glad you enjoyed it!
Best Nmap video, I have created my own notes off this, much respect for you.
Wow, thanks for the kind words, I really appreciate them!
Great content brother! Loved how you broke it down. Keep it up! 👍
Glad you liked it!
@@NNAdmin what’s not to like? Everyone seems to know the basics ( like with wireshark) but to harness the power it actually holds, only the few know how to wield it. ( oh and yes, I am one of those too 😉) perhaps a collaboration one day, I can see that.
I have to say that after watching three of your videos I learned more than I have in the last month on a paid subscription of hack the box !! You are a tremendous teacher and I can’t thank you enough for your time and sharing your knowledge. There is only ONE thing that would be helpful…. If you put a list of the commands you used in the comments so we can copy and paste them into a text file it would be perfect!!! I know moving forward I will have to return to this video many times to get the syntax right Thank again!!!!
You're very kind, I really appreciate you comments. I will see if I can remember to add the commands, at least the important ones, in the comments. Take care.
Its always good to throw sudo in there …..just in case you need it …..i will never forget sudo again ...caught the broadcast ARP @22.24..
i literally knew nothing about networks or cybersecurity until three hours ago, and now I at least know a thing or another about scanning. Thanks for the amazing video! going to enjoy metasploit now
Thanks a lot. I got A for my grades in intrusion and penetration testing assignment in college using your presentation
Thank you for explaining hard 2 understand things about nmap ... So clear and easy 2 understand👏
Glad to hear that!
great vid. im new to cybersec and just general interest in hacking, you explained nmap in a simple efficient way
Good luck to the channel. Uzbekistan👍👍👍👍👍✊✊✊✊✊✊
I’m glad I found this channel
That is really great to hear, we're glad you're here!
Great video tutorial. Simple and clear instruction, Learned a lot today. Thank you.
Great to hear!
Currently preparing for a state competition and this video is very helpful. Thanks!
Best of luck!
I'm new to your channel. Big Thanks way better than most tutorials on TH-cam
I appreciate that!
Bro, this is the best tutorial I've watched about nmap. Thanks a lot.
Glad it helped
Thank you that was a great video and no it wasn't that long... Your explanation of everything was great... 🙏
Glad you enjoyed it!
Excellent presentation of very useful info.
Glad it was helpful!
amazing tutorial, perfect for beginners. THX and continue with this!
Thanks, will do!
This video is amazing you are excellent at teaching, I can’t thank you enough for taking the time to create such a complete and detailed tutorial, you got a new sub
Glad it was helpful!
Simple and practical
love your contents, straight from Tanzania.... just beginning in the space, need more mentoring. Later make some IDS and IPS videos
did not hesitate giving a thumb up please keep going
Best Video on NMAP. Thank you SIR!!!!
Glad it was helpful!
Great video! Can't wait to check out more of your stuff!!!
More to come!
Great Video... Awesome job! Thanks a lot.. Your video was just the thing that I was looking to speeden up my progress... Keep doing this fab job...!!!
Great to hear!
Fire video 🔥 thank you! I’m learning everything from the ground up
Happy to help!
@@NNAdmin i agree im still trying to figure out what button or command you put to get a clean iplist.txt file using nano
REALLY good, thanks!
Glad you liked it!
so much information keep it up and i would like to know more about hydra tool cracking (:
thank you for this very informative video
Glad it was helpful!
i am going to hit and bang that like button, thanks for the content sir.
from India
Very much appreciated, thank you!
You got Wire shark outmy eyes are glued to the screen.........
Really helpful content dude thank for sharing 😃
Glad you liked it!
Great video! Great job man, keep it up ❤
Appreciate it!
Liked *AND* Subscribed!
Interested in keeping MY stuff clean and impenetrable!
Thank you
Awesome! Thank you!
Thanks brother i get some ideas from this video
subscribed...just halfway through...great video! thank you..
Excellent tutorial. I'm subscribed...
Thanks for the sub!
very good content, keep up the good work bro...
Appreciate it!
I just subscribed. This is a great video. Keep up with good work 👍
Thanks for the sub!
Great video, also confusing why you are not using root previleges
"more than you would beleive"?, this is the internet, your audience is anyone, even people that know more than you would believe😉
Thank you very much gor your video tutorials on Penetration Testing. You are wonderful !
Your videos are vety clear, well-designed at the same time.
I would appreciation you if you could provide some information on how to make dych videos! I mean if you could make a video on how to create a video like yours!
Thank you for the kind words!
Brilliant how you stay under the radar it would be interesting to see a wire capture of that ARP request.
Great suggestion!
@@NNAdmin oui if you get what i mean...
Brilliant!!! 👍🏻👍🏻👍🏻👍🏻 Thank you for sharing😊
My pleasure 😊
Great video!
Glad you enjoyed it
This is really helpful
thanks a lot man...this is gold
Hi. I'm a little bit late to the party but I'll ask my question anyway.
What does the -PR switch do? I couldn't find anything in the official Nmap documentation about a -PR switch!
Also, thanks for great content. Keep it up
PR = ping scan, and is used for host discovery. The switch tells Nmap to send an ICMP echo request (ping) to the target to determine if it's online or not. It doesn't perform any port scanning.
I'm sorry, but I have to point out the voicecrack at 22:34
Extremely outstanding tutorial nonetheless.
teacher is very, very good, video tutorial, I like
Thank you! 😃
(23:29) - marker, randomize scan
Good tutorial, thanks 👍.
Glad it was helpful!
Appreciate your work man! Subscribed
Thanks for the sub!
We need plz more and basic how to know the network ports and protocol ,I think ,that es is necessary to know 🎉🎉🎉🎉🎉🎉
Subscribed 👍 Awesome content love it!!!.
Welcome aboard!
yeah do the ip masking video bro you make everything so easy to learn ......
Thank you red ghost
Excellent stuff thanks
ya definitely subscribing, thanks alot for this helpful content
Welcome!
Great video. Hope to see more. Just curious what are you using to record your videos ?
Trade secret :P - really though I use OBS and sometimes edit in kdenlive, shotcut or openshot
Good stuff
Glad you enjoyed
Great video.. thanks a lot!
Glad you liked it!
Awesome video
Thanks!
I had to subscribe to this just woow😮😊
Great video
Glad you enjoyed it
I appreciate your help so much.
Happy to help!
Great video...earned my sub
Awesome, thank you!
this content is superb
Ah thank you!
excellent! subbed!
Great Video. You know your stuff Sir.
I appreciate that!
I found your tutorial to be very informative and helpful! Would you be able to create a tutorial on Wireshark?
Thank you! It's on my list, likely within the next few months.
Awesome
Great video! Thank you!
Glad you liked it!
Liked and subscribed!
Thank you so much!
nice information
Liked and subscribed, great content !
Welcome aboard!
Thanks Broo
This Video is awesome!
Glad you liked it!
@@NNAdmin Teach me everything you know, and I'll become a soldier in your army. :D
That's what we want !!
Excellent and very informative. Do you offer member tier plan which offers us an opportunity to ask questions and seek for your advice ?
I am a beginner and I have some questions related to your video which I wanna ask also wanna incentivise your great work
Very nice, I only use locust so far. Do you know it?
Thank you, This Locust? code.google.com/archive/p/locust-security/
Impressive...Subbed too
Thanks for the sub!
is there a channel which I can upload picures to illustrate my points? is the higher tiers membership offer this funcationality?
Whats the meaning of some flags being capital letters and others not?
Lowercase flags are for specific options, like -sS for TCP connect scan or -sT for TCP SYN scan. Uppercase flags, like -A for OS detection or -O for version detection, enable broader functionalities during the scan.
how do you make these machine vulnerble, Im doing project on pen testign tools and i want to know how to make these machine more vulnerble
Download Metasploitable and install it in an offline lab. Metasploitable it's a server that comes with vulnerabilities or just misconfigure smb, or certificates, or whatever on a machine inside a lab.
I have an open port on an ipad and want to FTP or get the images from it. What command or script should I use?
There's a million ways to get images of an iPad, including the common ones like airdrop, SMS, email, etc. Or mounting the device as a external drive....I am not sure why you would be looking for a script or using FTP....
I have a question for anyone who wanna help
When I run service and version scan I get a warning message
"retransmission cap hit (10)"
Still didn't find any solution online tho I'll be looking any help is gonna be well received
Hi,
The message "retransmission cap hit (10)" in the context of Nmap scans indicates that Nmap sent a certain number of retransmissions a target and reached a predefined cap of 10 retransmissions without receiving a response. This can happen for various reasons, and there are a few potential explanations and solutions:
Use the --scan-delay option to add a delay between probes: nmap --scan-delay 1s
Use the --max-retries option to limit the number of retries: nmap --max-retries 2
Use a combination of --max-retries and --max-scan-delay: nmap --max-retries 1 --max-scan-delay 10s
Use nmap -T0 to modify the timing. Note you can use T0 thru T5
See if that helps, otherwise it may be the firewall on the device you're scanning.
Thanks
Thank you so much for the support, I really appreciate it!
Can you make video on how to start, explore and find career path in cybersecurity
Maybe in the future.
Broseph Stalin you sound exactly like Gail Bettecker from breaking bad. Like exactly
Cool, I guess ;)
what are those ip address in iplist ? where did you get those from?
Those are from my private network and used just for the video.
Hello Nielsen i want to ask You about how did You achieved whole environment on video to practice all the things. I mean if there is somewhere video about configurating other VM's OS in Network with open ports etc, i installed Kali-Linux and also 4 other Windows VMs but during scanning all ports are closed/filtered. I tried to find video about it on Your channel but without success. Thanks for reply in advantage! I support also Your channel soon because i can learn alot of things here
Hello and Welcome!
I plan to create a video on how to setup a lab, similar to mine for testing in the near future. It will be sooner than later, after my next video that I have already started.