Skip to main content
JG is here with you โœจ

Nmap Scanner

Network discovery and security auditing. Learn port scanning, service detection, OS fingerprinting, and vulnerability assessment techniques.

red TeamIntermediateInteractive Scanning Lab

Nmap Network Scanner

Host Discovery, Port Scanning & Service Detection

Tool: Nmap โ€ข Skill Level: Intermediate โ€ข Defense: Reconnaissance

๐Ÿ’ป Desktop Experience Available

View this module on desktop for an interactive network scanning simulation with live Nmap interface.

Nmap (Network Mapper) is the industry-standard network scanner for discovering hosts, services, and vulnerabilities. Used by security professionals, pentesters, and sysadmins worldwide to map network topology and assess attack surface.

Core Functions:

  1. Host discovery (ping sweeps, ARP scans)
  2. Port scanning (TCP SYN, Connect, UDP, SCTP)
  3. Service/version detection (-sV flag)
  4. OS fingerprinting (-O flag)
  5. NSE scripts for vulnerability detection
  6. Output to XML/JSON for automation

Why Defenders Use It: Know your attack surface before attackers do. Nmap reveals exposed services, misconfigured firewalls, and shadow IT. Blue teams scan their own networks daily to detect unauthorized services.

Authorization Required

Network scanning should only be performed on networks you own or have explicit authorization to test. Unauthorized port scanning may violate CFAA and is considered hostile reconnaissance. Always obtain written permission before scanning.

Nmap Network Scanner

Discover network assets, identify open ports, detect service versions, and find vulnerabilities before attackers do. Essential for vulnerability assessment and network mapping.

5
Hosts Discovered
14
Vulnerabilities
4
At-Risk Hosts
1
Secure Hosts

Network Hosts

5 hosts
192.168.1.103 VULNS
web-server-01
Linux Ubuntu 20.04
22/SSH80/HTTP ๐Ÿšจ443/HTTPS ๐Ÿšจ3306/MySQL ๐Ÿšจ
192.168.1.152 VULNS
dc-primary
Windows Server 2019
53/DNS88/Kerberos389/LDAP445/SMB ๐Ÿšจ3389/RDP ๐Ÿšจ
192.168.1.254 VULNS
file-server
Windows Server 2016
21/FTP ๐Ÿšจ139/NetBIOS445/SMB ๐Ÿšจ3389/RDP ๐Ÿšจ
192.168.1.50SECURE
workstation-05
Windows 10 Pro
135/RPC139/NetBIOS445/SMB
192.168.1.1005 VULNS
iot-camera-01
Linux (embedded)
23/Telnet ๐Ÿšจ80/HTTP ๐Ÿšจ554/RTSP ๐Ÿšจ

Defender's Reconnaissance

Network Discovery: Map your infrastructure before attackers do. Know every open port and service.

Vulnerability Assessment: Nmap scripts (--script vuln) automate CVE detection across services.

Version Detection (-sV): Outdated software = attack surface. Track versions, patch aggressively.

Continuous Scanning: Networks change daily. Schedule regular scans to catch new vulnerabilities.

Risk Prioritization: Focus on critical services (SMB, RDP, SSH) and internet-facing assets first.

Open to AI-Focused Roles

AI Sales โ€ข AI Strategy โ€ข AI Success โ€ข Creative Tech โ€ข Toronto / Remote

Let's connect โ†’
Terms of ServiceLicense AgreementPrivacy Policy
Copyright ยฉ 2026 JMFG. All rights reserved.