Use Nmap for Tactical Network Reconnaissance [Tutorial]

Поделиться
HTML-код
  • Опубликовано: 25 ноя 2024

Комментарии • 257

  • @mattrisen6694
    @mattrisen6694 5 лет назад +29

    Instead of hitting up and home to add sudo to a command, you can run ‘sudo !!’ to run the last command with sudo. Just something that I found helpful. Love the videos, thank you for doing them and sharing the passion for our field.

    • @NullByteWHT
      @NullByteWHT  5 лет назад +6

      Thank you! And thanks for sharing that

    • @MegaStupidMonkeys
      @MegaStupidMonkeys 5 лет назад +2

      !! is really cool. You can even do something like echo "!!"

  • @seaner992
    @seaner992 5 лет назад +27

    -D just makes a lot more noise in the logs (2,472 lines vs 513) , and it still reveals your scan IP. Use -S followed by an IP. You might get a Nsock error, but it still works. It does not hide your IP during OS detection, but it does reduce the number of times it is logged vs -S. It does completely hide the IP on a normal scan. Also use '--spoof-mac' followed by a random MAC to hide your MAC. Use IP tables on another PC to view the noise.

  • @Minejokey
    @Minejokey 5 лет назад +93

    Do you want to learn something new on RUclips?
    just press the " i " button on your keyboard ^^
    also 0-9 are preset timestamps for every video on RUclips

  • @herman3985
    @herman3985 5 лет назад +31

    Absolutely love this channel! I've learnt so much about hacking and Linux in general because of you Kody. Your tutorials helped making me comfortable enough with Linux to leave Windows permanently. Happy new year and all the best to all viewers and of course Null Byte themselves.

    • @NullByteWHT
      @NullByteWHT  5 лет назад +2

      Thank you so much! I really appreciate it

  • @Jwojr
    @Jwojr 5 лет назад +5

    Can I just say thank you for your videos... the best way to learn pen testing skills on the internet. They very well put together and it’s also nice that you put out a written version!

    • @NullByteWHT
      @NullByteWHT  5 лет назад

      I'm glad other people find this stuff as interesting as I do!

  • @lowkey_out
    @lowkey_out 4 года назад +2

    I don't really watch really long videos, But Kody's videos are very interesting and amazing, he share knowledge for free and explains everything in an spectacular way everyone understands. And I don't even know how 15 mins fly away. Good work brother.

  • @manvaldez_
    @manvaldez_ 5 лет назад

    Great video for begginers man nice job, i got one thing to add. If you don't specify the ports to scan nmap is going to scan the top 1000 common ports in a system and not "every possible port" 7:11. Thanks for sharing

  • @riseabove3082
    @riseabove3082 5 лет назад +5

    Great video with very clear examples and explanations. Thank you for sharing your knowledge. I've played with nmap and arp-scan but it is nice to see someone else put it into practice as well.

  • @damienw4958
    @damienw4958 5 лет назад +11

    If you forget to run a command as root, simply type ‘sudo !!’ to run it again but as root !! means previous command

  • @sethadkins546
    @sethadkins546 5 лет назад +5

    8:29 Nice one Kody. (Pause and look closely under the censoring)

  • @deusvult4678
    @deusvult4678 5 лет назад +20

    Thank you and happy New Year. You are the only channel in which I activated the bell

    • @NullByteWHT
      @NullByteWHT  5 лет назад +2

      Thank you Ali! Happy new year

  • @b0bther4md0m
    @b0bther4md0m 5 лет назад +6

    I'm fairly new to all of this but iv been loving your tutorials

  • @JeffreyGroves
    @JeffreyGroves 5 лет назад +56

    The " | cat " on the command that you provided is extraneous. You should be able to remove that completely from the command to wind up with the following command line:
    sudo nmap -sS 192.168.0.0/24 | grep open >> results.txt
    Thanks for walking us through the use of nmap!
    Also, the two greater than signs ">>" means append to the file if it already exists; otherwise, create the file as new.

    • @brandondh
      @brandondh 5 лет назад +8

      Jeff Groves i was thinking the same thing. I just finished linux 1 and taking linux 2 in a couple of weeks. was kind of cool to see my mind remembering those commands and remembering that >> was append while > would overwrite the file each time. I also thought wait, why is he putting cat after the pipe, but syntax isnt always that important to remember since u figure it out as you go. he obviously has some pretty advanced skills and not everyone is an expert at everything. glad I wasnt the only one to catch that though. you must be a daily linux user or something. it gets pretty complicated so I hope linux 2 is easy for me... I aced linux 1 100 percent so lets see how I do with the security part which is linux 2. take it easy bro.

    • @NullByteWHT
      @NullByteWHT  5 лет назад +19

      Thank you so much for mentioning that! I'm still learning some of this myself, and teaching it helps me check myself against the community.

    • @NullByteWHT
      @NullByteWHT  5 лет назад +5

      Good luck!

    • @DDBAA24
      @DDBAA24 5 лет назад +2

      @@NullByteWHT Did you try to learn Linux before you jumped into Kali , or did you just start on Kali and learn to navigate the cli that way ? Personally I tried backtrack first and then soon realized that it wasn't the place to start. So I just grabbed a basic Debian based distro and learned everything I could about Linux. Then when I came back to what is now Kali and can actually understand the how , and the why. Learning the system in and out, then I jumped into networking & hardware, because if your going to understand vulnerabilities sometimes it goes all the way down to a hardware level not just software. For over a year I didn't even look at anything pentesting related. That said , doing it that way its so much easier to pick this stuff up, and I hate the term but I didn't want to be a script kiddie. I know this is getting long. After all is said and done, THEN you have to go back to Windows and learn CMD because how are you going to exploit a machine if you dont know how to control it ! What average Windows user even ever opens CMD its all graphical tools in windows. Its like alright I learned Linux to learn Kali to go back and learn the technical side of windows in order to manipulate it lol. Crazy cycle, but well worth the journey. Without a grasp on cli, networking, hardware, and multiple operating systems its impossible to use Kali to its potential if at all. No one should try and learn Linux on Kali it is not entry level friendly @ ALL. Am I making sense ? Now that I rambled I wanted to know how you decide on the topics for each video. Some of that is based on the Pi itself and its constraints, but not all videos are based on the Pi so I ask.

    • @DDBAA24
      @DDBAA24 5 лет назад

      How long have you been at this from a security based standpoint ?

  • @jugginator4390
    @jugginator4390 5 лет назад +7

    Great tutorial as always, but I noticed your censoring is off if you wanted to hide the mac address at around 8:30 , it moves with the scrolling -- just in case I wanted you to know :) happy new year!

  • @horseman684
    @horseman684 3 года назад

    Thanks bro I have so much diy and have the basic grasp of nmap before this tute, its a soft listen on repetition for me, I mean I only felt smart after school, so im assuming that something sunk in when I was semi concious

  • @wakeupNeo_
    @wakeupNeo_ 3 года назад

    this is the best Nmap video for beginners, thanks

  • @isaacmihaeli3261
    @isaacmihaeli3261 Год назад

    This tutorial is easy to follow and understand. As of today 12/30/2022.

  • @lousingbamoirang7412
    @lousingbamoirang7412 5 лет назад +7

    I keep watching this channel.

  • @francescopresta9570
    @francescopresta9570 5 лет назад +3

    Great job Kody, happy new year from Italy

  • @Parrotassassin15TechToker
    @Parrotassassin15TechToker 5 лет назад +4

    i reeeaally like ur videos, i've learned soo much from ur channel. me and my friend really want to be like you. you made me wanna go more into computer science. you made it soo much more fun than other channels thanks!!!!

    • @NullByteWHT
      @NullByteWHT  5 лет назад

      Thanks! That really sweet, means a lot to me. You'll do great in CS!

  • @leonardofelippine9781
    @leonardofelippine9781 4 года назад +1

    I had no idea that Sheldon Cooper was also a hacker...
    Jokes aside, great content. I am learning a lot. Thank you

  • @RNSounds7
    @RNSounds7 5 лет назад +1

    Hey bud! Amazing content, please continue to make more. Happy New Years!!!

  • @awesomesauce804
    @awesomesauce804 3 года назад

    whoa, ipcalc? you just changed my life.

  • @rilian226
    @rilian226 4 года назад

    >> means append to the end of the file...not overwrite. > will overwrite the contents of the file if it exists. You don't need to pipe through cat either... just >> to append and > to overwrite.
    If you want to see the results on screen _and_ log them in a text file pipe to the `tee` command: `nmap | grep | tee output.txt`
    backing up a bit...if you need to sudo your last command, do: `sudo !!` . Much faster than up arrow and going to start of line, etc.

  • @D3rMesaa
    @D3rMesaa 5 лет назад +37

    Whoops MAC Adress at 13:20

    • @WraithLunati
      @WraithLunati 4 года назад +3

      Ha! Didn't even read the comments till now, first thing I saw lol.

    • @coolcoyote1893
      @coolcoyote1893 4 года назад +1

      There is also one at 8:29

    • @thedoomslayer6526
      @thedoomslayer6526 4 года назад

      because it' very difficult to restart the VM and change it

    • @bitfragment
      @bitfragment 4 года назад +2

      @@thedoomslayer6526 it was the MAC of the router

  • @SecTechie
    @SecTechie 4 месяца назад

    Love this channel. Keep up the good work. Great video. Thanks.

  • @mohammadaminrajabi1828
    @mohammadaminrajabi1828 5 лет назад +1

    The video was really useful. I really thank you and I really wish you for more subscriptions. You can speak really great and I'm enthusiastic to see more videos.

    • @securitypoint8280
      @securitypoint8280 5 лет назад

      Check this sir for more details enumerations ruclips.net/video/1XAssdnTQSo/видео.html

  • @cyber_student
    @cyber_student 3 года назад

    Man. You are such an inspiration dude. Thank you.

  • @NM-hp2lc
    @NM-hp2lc 4 года назад

    Nice GITS wallpaper. New subscriber here, loving your tutorials so far

  • @cocokash
    @cocokash 2 года назад

    Thanks for sharing, really appreciate it!, more content please....

  • @bileysikdar3389
    @bileysikdar3389 5 лет назад +2

    Hi Kody, Make a video on Possible firewall, ids evasion techniques.

  • @sheerazali2395
    @sheerazali2395 5 лет назад +1

    Happy new year kody these videos are really nice we want more

    • @NullByteWHT
      @NullByteWHT  5 лет назад +1

      Thank you for watching them! I appreciate each and every one of these comments

    • @sheerazali2395
      @sheerazali2395 5 лет назад

      @@NullByteWHT you put a whole lot of work bro.we have to be there when a new video comes out

    • @sheerazali2395
      @sheerazali2395 5 лет назад

      @@NullByteWHT make few videos about buffer overflows and lfi rfi

    • @NullByteWHT
      @NullByteWHT  5 лет назад +1

      @@sheerazali2395 I really like the community! I'm getting a little bored of the format though, I want to start working on something new!

    • @sheerazali2395
      @sheerazali2395 5 лет назад

      @@NullByteWHT I'll love to be on any projects with you I am not new to cyber security but I am still learning I'll work for free

  • @seasonedtoker
    @seasonedtoker 4 года назад +1

    @5:15 - no option will scan 1000 ports, -F option scans 100, but if you want to scan all 65535 ports, you should use '-p - ' option

    • @NullByteWHT
      @NullByteWHT  4 года назад +1

      Thanks for the tip seasonedtoker!

  • @navinraj5697
    @navinraj5697 5 лет назад

    Good ...brother..your tutoriel is great ..but i am bigginer..so i have little confusion..your web tutoriel is also good..congradulation..jan video..just i have seen..ha..ha..super..please upload more..ethycal hacking knowledge...

  • @droy333
    @droy333 5 лет назад

    On Windows? Advanced IP Scanner is handy. Sure it can't do everything nmap can do like specify ports etc but it will scan multiple subnets at once and give you any common services on hosts.

  • @thehound3961
    @thehound3961 5 лет назад +12

    Kody, happy new year....
    we would like to see more videos about hacking Android .......not a lot of PC's around here..

    • @DDBAA24
      @DDBAA24 5 лет назад

      @I dont know anymore Yeah that would be for hacking with your Android, I believe he means actually hacking Android phones, its un clear but.... Which without user interaction or physical access can prove to be a pretty daunting task. Which entails the ring buffer in the kernel, compromising the WiFi stack, using aireplay-ng to collect frames and then spoofing a network that the phone is calling out to that it has securely connected to previously. Then once its on your fake network that has the phone thinking its home its business as usual from there you still have to gain access to the device some way. and you can use Termux without root , the best route is the kali nethunter rom or pwnie express phone. I say that because a lot of scripts do not work properly because they were meant to be ran on a cell phone. All though I saw a pretty cool video of someone installing ubuntu from git in termux, I guess if you did that and then installed kali tools you might be able to use thing to their full potential.

    • @PScraftGaming
      @PScraftGaming 5 лет назад

      Mostly everyone has a PC.. Even use a family computer if you have to.

    • @lucasthompson1650
      @lucasthompson1650 5 лет назад

      @username yup!

  • @Canadian789119
    @Canadian789119 5 лет назад

    Good for pen testing, to close vulnerabilities of course.

  • @hondaromio
    @hondaromio 4 года назад

    Kody, love that shirt, thanks for all you do!

  • @zeroblue5599
    @zeroblue5599 5 лет назад +7

    Im userland user love this tactical nmap

  • @mervynally459
    @mervynally459 5 лет назад +1

    Thank you congratulations happy new year

  • @its336already6
    @its336already6 5 лет назад +2

    i was waiting for this video ty!!

    • @NullByteWHT
      @NullByteWHT  5 лет назад +2

      Your welcome, thanks for watching!

  • @michaelselui6998
    @michaelselui6998 5 лет назад +2

    Please add English subtitles, happy new year

  • @x.a.k.i5858
    @x.a.k.i5858 5 лет назад +2

    Thank you the video was quite informative

  • @jonahhex1295
    @jonahhex1295 5 лет назад +1

    Thanks kody , great tutorial as always.

  • @jamesk1242
    @jamesk1242 5 лет назад

    Love this channel, nice videos Kody!

  • @house105a
    @house105a 2 года назад

    You are awesome Kody

  • @djjcbs8989
    @djjcbs8989 5 лет назад +1

    Like your videos. Easy to learn from.

  • @igot17hoursbaby20
    @igot17hoursbaby20 4 года назад

    Hell yes!! This is fun! Thank you!

  • @alexandresantosal
    @alexandresantosal 8 месяцев назад

    Parabéns pelo excelente conteúdo...

  • @omarbayli
    @omarbayli 4 года назад

    Instead of piping grep open, you can use --open option.

  • @jonahhex1295
    @jonahhex1295 4 года назад

    Awesome , great video, thanks!!

  • @goofydadda
    @goofydadda 5 лет назад +2

    Hey, what’s the song at the start? It’s cool

  • @DavidJames0322
    @DavidJames0322 4 года назад +1

    Try doing this with other IP addresses (research purposes only), "too many fingerprints match this host to give specific OS details". etc. etc. etc. Firewall blocks nmap scans, different methods as well are outdated. Also assuming that IP when conducting scans, allow them to receive that scans are being conducted to IP addresses which leads me to believe that those scans will notify IP and further investigation can be conducted on your own IP address. Any thoughts on this?

  • @RAGHAVENDRASINGH17
    @RAGHAVENDRASINGH17 5 лет назад

    At 16.20 i got jump scare 😂 nice video , you have many awesome contents on this channel

  • @paulmorrey733
    @paulmorrey733 5 лет назад +1

    Thanks

  • @TaylorSwifty69
    @TaylorSwifty69 4 года назад

    This was great! Thank you.

    • @NullByteWHT
      @NullByteWHT  4 года назад

      Christopher thanks for watching! Tell all of your friends about us! 😃

  • @aanchaldeep1699
    @aanchaldeep1699 4 года назад

    Very informative ....👍

  • @true_tamilan
    @true_tamilan 4 года назад

    Thank you very much

  • @sarkybugger5009
    @sarkybugger5009 4 года назад

    There's a GUI front-end available. Zenmap.

  • @HK-sw3vi
    @HK-sw3vi 5 лет назад +1

    hey man, keep this shit up... it really helped!!

  • @feiwhang
    @feiwhang 5 лет назад

    I have a question regarding macbook pro's touch bar. Does it work with kali on virtualbox? I'm in market for laptop to study pen testing. I can't choose between macbook pro or a thinkpad. Any advice? thanks

  • @enriqueperez339
    @enriqueperez339 5 лет назад

    Are there any videos that go over all the different types of networks/ IP addresses like what’s en, en0, lo, Wlan0

  • @iliaschannel3646
    @iliaschannel3646 3 года назад

    hello how to perfom an anonymous scan ?? i heard about proxy chains and whonix , what is your suggestion

  • @thehound3961
    @thehound3961 5 лет назад +1

    great video btw.....as always..

  • @kumanish75
    @kumanish75 4 года назад

    awesome video

  • @King66nb766
    @King66nb766 4 года назад

    First of all i would like to thank you for great educational videos ⚘
    My question is do you have any idea how to get ms teams group member IP address and other informations ?

  • @HARMEETSINGH-fr4gz
    @HARMEETSINGH-fr4gz 5 лет назад +3

    Sir you are a great hacker

    • @NullByteWHT
      @NullByteWHT  5 лет назад +1

      Thank yoy!

    • @HARMEETSINGH-fr4gz
      @HARMEETSINGH-fr4gz 5 лет назад +1

      @@NullByteWHT sir please teach us SS7 and is nullbyte.com is your website

  • @NotSoCrazyNinja
    @NotSoCrazyNinja 4 года назад +1

    13:21 you dun goofed

  • @adammagdy2795
    @adammagdy2795 5 лет назад +1

    great thanks for the great content :0

  • @CyberFreaked
    @CyberFreaked 5 лет назад +1

    Why do you blur your internal mac addresses? As far as I know it wouldn't be harmfull

  • @adammagdy2795
    @adammagdy2795 5 лет назад

    hhapy new YEAR WOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOW

  • @ahsan479
    @ahsan479 4 года назад +1

    suppose I got a friend who is from another country, now I got his IP and I want to scan him through Nmap, but it says that the host is not active? why? can anybody help?

    • @NullByteWHT
      @NullByteWHT  4 года назад +1

      You sure it's a static public IP? And maybe there no ports open/ their devices are off.

    • @dmetrebermuxchi2801
      @dmetrebermuxchi2801 4 года назад

      Null Byte so if you get the static ip of a phone what are the many different things that you can do with this? Considering it’s not rooted or anything it’s a normal iphone, can it still be scanned and exploited? Or are static ips only for laptops? Also if you have the MAC address of a device be it phone or laptop what can you do with this aside from possibly kicking them off a network? It’s good to know so that one can protect oneself from the vulnerabilities that exist.

  • @error346
    @error346 5 лет назад

    hy!! i have an isue writing a comand.. how to conduct a ACK scan with OS identification and scan fewer ports then normal? i tried nmap -sA -O -p 80,21,3306, but nope. can you help me?

  • @alecolson3866
    @alecolson3866 5 лет назад +1

    If I type in ipcalc the terminal gives me the message that it is an invalid command.. do I need to have a separate program installed? What causes this?

    • @tribeofcam3762
      @tribeofcam3762 5 лет назад

      Same here why does this happen Kody help

  • @biniesh7097
    @biniesh7097 5 лет назад

    thank you for the vide0!

  • @LucasAlfa.
    @LucasAlfa. 5 лет назад +4

    Good vids keep going =)

  • @paolomarcelogalvan1938
    @paolomarcelogalvan1938 3 года назад

    What kind of linux os have supported nmap

  • @marcusv.7565
    @marcusv.7565 2 года назад

    hi, how about (socket: Operation not permitted) ? have any idea how fix this? i already did the ifconfig eth0 down in terminal emulator but its all clear and no errors but still (socket: Operation not permitted) again

  • @aritrakayal4280
    @aritrakayal4280 4 года назад

    this video was really helpful .....but i have one question ..there are several videos over youtube showing different methods to stay annonymous while hacking , so while hacking over a network which is the best method to remain annonymous???..please do reply ...and lots of love from India

    • @NullByteWHT
      @NullByteWHT  4 года назад

      Check out our guide on how to Fully Anonymize Kali with Tor, Whonix, and PIA VPN I think you'll find it helpful. null-byte.wonderhowto.com/how-to/fully-anonymize-kali-with-tor-whonix-pia-vpn-0180040/

  • @tensor-records
    @tensor-records 5 лет назад

    Link for your wallpaper pleeeaaasseee.

  • @RedBlueLabs
    @RedBlueLabs 5 лет назад

    great video :)

  • @vsanchez1295
    @vsanchez1295 3 года назад

    Okay so I installed Linux in VMware, when I run ifconfig, it is different subnet than my actual router, so when I run nmap or arp scans it scans the virtual subnet instead of the LAN. Please help, I'm a total NEWB!

  • @curtnorris4458
    @curtnorris4458 5 лет назад

    Nice MAC Address you have there at 8:29... The redacted text is visible when you scroll up.

  • @sanketneralkatte7651
    @sanketneralkatte7651 5 лет назад

    Sir i m a beginner nd i m passionate about hacking nd all.......so on which platform would u like to just me like kali linux , ubuntu nd etc

  • @aliasgarkhimani9204
    @aliasgarkhimani9204 2 года назад

    serious question: how do you _not_ blink?

  • @totons9036
    @totons9036 5 лет назад

    By running ifconfig, it does not show local ip, but it shows static ip. How to see local ip?

  • @MattTheCuber1
    @MattTheCuber1 Год назад

    MAC Address leak: 13:22 (if you pause at the right second)

  • @combogfx228
    @combogfx228 5 лет назад +1

    I am running ubuntu on a windows machine and when I type "nmap -f" it tells me that fragscan needs root privileges, how do I grant root privileges

  • @friknoob9823
    @friknoob9823 4 года назад

    what if your access is denied when you do arp-scan -l

  • @kenichimori8533
    @kenichimori8533 5 лет назад

    Pormating point.

  • @tyronehatter6813
    @tyronehatter6813 3 года назад

    4:21 help im so confused how do i know which ip to copy

  • @lalbudha3025
    @lalbudha3025 4 года назад

    Could you please make a video on Metasploitable 3 ?

    • @NullByteWHT
      @NullByteWHT  4 года назад +1

      Good idea Lal Budha, I've added it to the list of video ideas.

  • @matthewheelie4432
    @matthewheelie4432 4 года назад

    is this better than Fing?

  • @carlosgandara5976
    @carlosgandara5976 5 лет назад

    What’s up dude. Check it out, I got a asus rt-ac66u router I need to get username and password but I cannot reset it. Which Linux should I use and what tool ?

  • @hellopropop
    @hellopropop 4 года назад

    please reply why cant we use arp -a

  • @HarryNikic
    @HarryNikic 4 года назад

    when doing "sudo nmap -sS 192.169.**.* " i am getting this message " dnet: Failed to open device eth0" can anyone help, thanks

  • @blahblahblah3819
    @blahblahblah3819 4 года назад

    Is this a UAV?

  • @devanshujatav3113
    @devanshujatav3113 5 лет назад

    Which os it is

  • @vibe6566
    @vibe6566 5 лет назад

    Why using sudo code?pls tell me

  • @cody9568
    @cody9568 4 года назад

    The command ipcalc didn't work for me?