Network discovery and security auditing. Learn port scanning, service detection, OS fingerprinting, and vulnerability assessment techniques.
Host Discovery, Port Scanning & Service Detection
Tool: Nmap โข Skill Level: Intermediate โข Defense: Reconnaissance
๐ป Desktop Experience Available
View this module on desktop for an interactive network scanning simulation with live Nmap interface.
Nmap (Network Mapper) is the industry-standard network scanner for discovering hosts, services, and vulnerabilities. Used by security professionals, pentesters, and sysadmins worldwide to map network topology and assess attack surface.
Why Defenders Use It: Know your attack surface before attackers do. Nmap reveals exposed services, misconfigured firewalls, and shadow IT. Blue teams scan their own networks daily to detect unauthorized services.
Network scanning should only be performed on networks you own or have explicit authorization to test. Unauthorized port scanning may violate CFAA and is considered hostile reconnaissance. Always obtain written permission before scanning.
Discover network assets, identify open ports, detect service versions, and find vulnerabilities before attackers do. Essential for vulnerability assessment and network mapping.
Network Discovery: Map your infrastructure before attackers do. Know every open port and service.
Vulnerability Assessment: Nmap scripts (--script vuln) automate CVE detection across services.
Version Detection (-sV): Outdated software = attack surface. Track versions, patch aggressively.
Continuous Scanning: Networks change daily. Schedule regular scans to catch new vulnerabilities.
Risk Prioritization: Focus on critical services (SMB, RDP, SSH) and internet-facing assets first.