Enjoy the video on Nmap's uses for Penetration Testing! Please smash the like button and subscribe if you enjoyed the video. Chapters: 0:00 Intro 1:38 Rules of Engagement 2:26 Network Verification 2:55 Layer 2 Host Discovery 4:27 IP list Creation 4:50 Layer 3 Host Discovery 6:30 Layer 4 Host Discovery 7:45 Port States 8:59 Default Nmap Scans 10:50 Specific Port Scan 12:43 Filtered Port Scan 14:15 UDP Port Scan 15:43 Service and Version Enumeration Scan 18:00 Operating System Discovery Scan 19:40 Detection Avoidance - Timing of Scans 21:34 Detection Avoidance - Decoy Scan 23:06 Detection Avoidance - Random Host Scan 24:17 Detection Avoidance - Spoofing Mac Address 25:31 Detection Avoidance - Fragmented Scan 27:06 Review of Nmap Script Sources 28:50 SMB Vulnerability Scan 30:35 FTP Vulnerability Scan 31:26 VULN Vulnerability Scan 34:40 Metasploit Vulnerability Exploitation 37:15 Defensive Tactics 37:52 Closing Thoughts Please Like and Subscribe by clicking here: studio.ruclips.net/channel/UC39GKRsNps38x7UzydcOZ9w Follow me on Twitter: twitter.com/NielsenNTWKING
Hello Nielsen, thanks for the video! I have some questions for you: 1) My question is this, how do you close those ports Or How do you stop them from being exploited! 2) Do you have Nmap on Parrot OS ? If yes, will the above commands work? Thanks in anticipation!
I've been looking for a tutorial on network discovery but most of them don't explain very well or don't go in a lot of depth. This video is amazing and i leanred a lot from this. Keep up the good work.
Fantastic video! You did a great job of breaking down some of the functions of NMAP and addressing that portion of us that aren’t completely new, but also aren’t professionals with 5 or 10 years+ of experience. Please keep putting out videos. You got a subscriber just from watching this one video!
I am new to tech world and I have been using nmap base on the books I read but I never had a better practical understanding of nmpa. You cant imagine how happy I am but I will say a big thank you for this teach here. You are appreciate
Man you explained everything clearly thank you, so much, i loved that opening question " are you ready to take your pentest skills to a next level" 🔥🔥🔥❤🔥❤🔥
i literally knew nothing about networks or cybersecurity until three hours ago, and now I at least know a thing or another about scanning. Thanks for the amazing video! going to enjoy metasploit now
I have to say that after watching three of your videos I learned more than I have in the last month on a paid subscription of hack the box !! You are a tremendous teacher and I can’t thank you enough for your time and sharing your knowledge. There is only ONE thing that would be helpful…. If you put a list of the commands you used in the comments so we can copy and paste them into a text file it would be perfect!!! I know moving forward I will have to return to this video many times to get the syntax right Thank again!!!!
You're very kind, I really appreciate you comments. I will see if I can remember to add the commands, at least the important ones, in the comments. Take care.
@@NNAdmin what’s not to like? Everyone seems to know the basics ( like with wireshark) but to harness the power it actually holds, only the few know how to wield it. ( oh and yes, I am one of those too 😉) perhaps a collaboration one day, I can see that.
This video is amazing you are excellent at teaching, I can’t thank you enough for taking the time to create such a complete and detailed tutorial, you got a new sub
Thank you very much gor your video tutorials on Penetration Testing. You are wonderful ! Your videos are vety clear, well-designed at the same time. I would appreciation you if you could provide some information on how to make dych videos! I mean if you could make a video on how to create a video like yours!
Hi. I'm a little bit late to the party but I'll ask my question anyway. What does the -PR switch do? I couldn't find anything in the official Nmap documentation about a -PR switch! Also, thanks for great content. Keep it up
PR = ping scan, and is used for host discovery. The switch tells Nmap to send an ICMP echo request (ping) to the target to determine if it's online or not. It doesn't perform any port scanning.
Download Metasploitable and install it in an offline lab. Metasploitable it's a server that comes with vulnerabilities or just misconfigure smb, or certificates, or whatever on a machine inside a lab.
There's a million ways to get images of an iPad, including the common ones like airdrop, SMS, email, etc. Or mounting the device as a external drive....I am not sure why you would be looking for a script or using FTP....
Hello Nielsen i want to ask You about how did You achieved whole environment on video to practice all the things. I mean if there is somewhere video about configurating other VM's OS in Network with open ports etc, i installed Kali-Linux and also 4 other Windows VMs but during scanning all ports are closed/filtered. I tried to find video about it on Your channel but without success. Thanks for reply in advantage! I support also Your channel soon because i can learn alot of things here
Hello and Welcome! I plan to create a video on how to setup a lab, similar to mine for testing in the near future. It will be sooner than later, after my next video that I have already started.
@@Anonymous51701 thanks man, btw, the oracle virtualbox doesn't work for me anymore, when i try to run Kali Linux it gives me an error that says something about the virtual memory. I Tried everything to fix it but it doesn't work, you know why?
I have a question for anyone who wanna help When I run service and version scan I get a warning message "retransmission cap hit (10)" Still didn't find any solution online tho I'll be looking any help is gonna be well received
Hi, The message "retransmission cap hit (10)" in the context of Nmap scans indicates that Nmap sent a certain number of retransmissions a target and reached a predefined cap of 10 retransmissions without receiving a response. This can happen for various reasons, and there are a few potential explanations and solutions: Use the --scan-delay option to add a delay between probes: nmap --scan-delay 1s Use the --max-retries option to limit the number of retries: nmap --max-retries 2 Use a combination of --max-retries and --max-scan-delay: nmap --max-retries 1 --max-scan-delay 10s Use nmap -T0 to modify the timing. Note you can use T0 thru T5 See if that helps, otherwise it may be the firewall on the device you're scanning.
@@NNAdmin yes and i can ping to it, but i found out its the fire wall at default. i dont know what the inbound or outbound setting is preventing nmap. the wierd part is nmap works on my host computer that has norton security
Enjoy the video on Nmap's uses for Penetration Testing! Please smash the like button and subscribe if you enjoyed the video.
Chapters:
0:00 Intro
1:38 Rules of Engagement
2:26 Network Verification
2:55 Layer 2 Host Discovery
4:27 IP list Creation
4:50 Layer 3 Host Discovery
6:30 Layer 4 Host Discovery
7:45 Port States
8:59 Default Nmap Scans
10:50 Specific Port Scan
12:43 Filtered Port Scan
14:15 UDP Port Scan
15:43 Service and Version Enumeration Scan
18:00 Operating System Discovery Scan
19:40 Detection Avoidance - Timing of Scans
21:34 Detection Avoidance - Decoy Scan
23:06 Detection Avoidance - Random Host Scan
24:17 Detection Avoidance - Spoofing Mac Address
25:31 Detection Avoidance - Fragmented Scan
27:06 Review of Nmap Script Sources
28:50 SMB Vulnerability Scan
30:35 FTP Vulnerability Scan
31:26 VULN Vulnerability Scan
34:40 Metasploit Vulnerability Exploitation
37:15 Defensive Tactics
37:52 Closing Thoughts
Please Like and Subscribe by clicking here: studio.ruclips.net/channel/UC39GKRsNps38x7UzydcOZ9w
Follow me on Twitter: twitter.com/NielsenNTWKING
Liked and i am already sudbd
Hello Nielsen, thanks for the video!
I have some questions for you:
1) My question is this, how do you close those ports Or How do you stop them from being exploited!
2) Do you have Nmap on Parrot OS ? If yes, will the above commands work?
Thanks in anticipation!
indeed ser!
tYvM
kangs
I've been looking for a tutorial on network discovery but most of them don't explain very well or don't go in a lot of depth. This video is amazing and i leanred a lot from this. Keep up the good work.
Glad I could help!
Fantastic video! You did a great job of breaking down some of the functions of NMAP and addressing that portion of us that aren’t completely new, but also aren’t professionals with 5 or 10 years+ of experience. Please keep putting out videos. You got a subscriber just from watching this one video!
Glad it was helpful, and thanks for the kind words. :)
This channel is a hidden gem wow. Thank you so much.
Wow, thank you for the kind words!
I am new to tech world and I have been using nmap base on the books I read but I never had a better practical understanding of nmpa. You cant imagine how happy I am but I will say a big thank you for this teach here. You are appreciate
Glad it was helpful!
Man you explained everything clearly thank you, so much, i loved that opening question " are you ready to take your pentest skills to a next level" 🔥🔥🔥❤🔥❤🔥
Glad you enjoyed it!
Thanks. I just started learning pen testing and this video has been the most informative I have come across so far 👍
Excellent demonstration! Highly recommend this for beginners who are new to Kali and nmap
Glad it was helpful!
i literally knew nothing about networks or cybersecurity until three hours ago, and now I at least know a thing or another about scanning. Thanks for the amazing video! going to enjoy metasploit now
just stumbled upon you... way better than most tutors on youtube keep it up bro u got a daily watcher here
I appreciate that!
Best Nmap video, I have created my own notes off this, much respect for you.
Wow, thanks for the kind words, I really appreciate them!
I have to say that after watching three of your videos I learned more than I have in the last month on a paid subscription of hack the box !! You are a tremendous teacher and I can’t thank you enough for your time and sharing your knowledge. There is only ONE thing that would be helpful…. If you put a list of the commands you used in the comments so we can copy and paste them into a text file it would be perfect!!! I know moving forward I will have to return to this video many times to get the syntax right Thank again!!!!
You're very kind, I really appreciate you comments. I will see if I can remember to add the commands, at least the important ones, in the comments. Take care.
Im about to try to go into cybersecurity loving learning from you im use to coding websites and apps but im enjoying this more
Great to hear!
Thank you for explaining hard 2 understand things about nmap ... So clear and easy 2 understand👏
Glad to hear that!
Its always good to throw sudo in there …..just in case you need it …..i will never forget sudo again ...caught the broadcast ARP @22.24..
great vid. im new to cybersec and just general interest in hacking, you explained nmap in a simple efficient way
Thanks a lot. I got A for my grades in intrusion and penetration testing assignment in college using your presentation
I’m glad I found this channel
That is really great to hear, we're glad you're here!
I'm new to your channel. Big Thanks way better than most tutorials on RUclips
I appreciate that!
Currently preparing for a state competition and this video is very helpful. Thanks!
Best of luck!
Bro, this is the best tutorial I've watched about nmap. Thanks a lot.
Glad it helped
Great content brother! Loved how you broke it down. Keep it up! 👍
Glad you liked it!
@@NNAdmin what’s not to like? Everyone seems to know the basics ( like with wireshark) but to harness the power it actually holds, only the few know how to wield it. ( oh and yes, I am one of those too 😉) perhaps a collaboration one day, I can see that.
cool intro, that beat is bussin
:)
Good luck to the channel. Uzbekistan👍👍👍👍👍✊✊✊✊✊✊
love your contents, straight from Tanzania.... just beginning in the space, need more mentoring. Later make some IDS and IPS videos
Great video tutorial. Simple and clear instruction, Learned a lot today. Thank you.
Great to hear!
This video is amazing you are excellent at teaching, I can’t thank you enough for taking the time to create such a complete and detailed tutorial, you got a new sub
Glad it was helpful!
Thank you that was a great video and no it wasn't that long... Your explanation of everything was great... 🙏
Glad you enjoyed it!
amazing tutorial, perfect for beginners. THX and continue with this!
Thanks, will do!
Best Video on NMAP. Thank you SIR!!!!
Glad it was helpful!
Excellent presentation of very useful info.
Glad it was helpful!
did not hesitate giving a thumb up please keep going
Great video! Can't wait to check out more of your stuff!!!
More to come!
Fire video 🔥 thank you! I’m learning everything from the ground up
Happy to help!
@@NNAdmin i agree im still trying to figure out what button or command you put to get a clean iplist.txt file using nano
Great Video... Awesome job! Thanks a lot.. Your video was just the thing that I was looking to speeden up my progress... Keep doing this fab job...!!!
Great to hear!
You got Wire shark outmy eyes are glued to the screen.........
Really helpful content dude thank for sharing 😃
Glad you liked it!
subscribed...just halfway through...great video! thank you..
Thanks brother i get some ideas from this video
Simple and practical
"more than you would beleive"?, this is the internet, your audience is anyone, even people that know more than you would believe😉
i am going to hit and bang that like button, thanks for the content sir.
from India
Very much appreciated, thank you!
thank you for this very informative video
Glad it was helpful!
Excellent tutorial. I'm subscribed...
Thanks for the sub!
Thank you very much gor your video tutorials on Penetration Testing. You are wonderful !
Your videos are vety clear, well-designed at the same time.
I would appreciation you if you could provide some information on how to make dych videos! I mean if you could make a video on how to create a video like yours!
Thank you for the kind words!
I just subscribed. This is a great video. Keep up with good work 👍
Thanks for the sub!
Appreciate your work man! Subscribed
Thanks for the sub!
Great video! Great job man, keep it up ❤
Appreciate it!
thanks a lot man...this is gold
very good content, keep up the good work bro...
Appreciate it!
REALLY good, thanks!
Glad you liked it!
This is really helpful
Liked *AND* Subscribed!
Interested in keeping MY stuff clean and impenetrable!
Thank you
Awesome! Thank you!
Great video. Hope to see more. Just curious what are you using to record your videos ?
Trade secret :P - really though I use OBS and sometimes edit in kdenlive, shotcut or openshot
Hi. I'm a little bit late to the party but I'll ask my question anyway.
What does the -PR switch do? I couldn't find anything in the official Nmap documentation about a -PR switch!
Also, thanks for great content. Keep it up
PR = ping scan, and is used for host discovery. The switch tells Nmap to send an ICMP echo request (ping) to the target to determine if it's online or not. It doesn't perform any port scanning.
Brilliant!!! 👍🏻👍🏻👍🏻👍🏻 Thank you for sharing😊
My pleasure 😊
Great video, also confusing why you are not using root previleges
Brilliant how you stay under the radar it would be interesting to see a wire capture of that ARP request.
Great suggestion!
@@NNAdmin oui if you get what i mean...
teacher is very, very good, video tutorial, I like
Thank you! 😃
Subscribed 👍 Awesome content love it!!!.
Welcome aboard!
I appreciate your help so much.
Happy to help!
Excellent and very informative. Do you offer member tier plan which offers us an opportunity to ask questions and seek for your advice ?
I am a beginner and I have some questions related to your video which I wanna ask also wanna incentivise your great work
I found your tutorial to be very informative and helpful! Would you be able to create a tutorial on Wireshark?
Thank you! It's on my list, likely within the next few months.
Good tutorial, thanks 👍.
Glad it was helpful!
Great video!
Thanks!
Excellent stuff thanks
Great video.. thanks a lot!
Glad you liked it!
We need plz more and basic how to know the network ports and protocol ,I think ,that es is necessary to know 🎉🎉🎉🎉🎉🎉
ya definitely subscribing, thanks alot for this helpful content
Welcome!
This Video is awesome!
Glad you liked it!
@@NNAdmin Teach me everything you know, and I'll become a soldier in your army. :D
yeah do the ip masking video bro you make everything so easy to learn ......
Great video...earned my sub
Awesome, thank you!
Great video! Thank you!
Glad you liked it!
this content is superb
Ah thank you!
Awesome video
Thanks!
Awesome
Great Video. You know your stuff Sir.
I appreciate that!
I had to subscribe to this just woow😮😊
is there a channel which I can upload picures to illustrate my points? is the higher tiers membership offer this funcationality?
excellent! subbed!
Great video
Glad you enjoyed it
Liked and subscribed!
Thank you so much!
Liked and subscribed, great content !
Welcome aboard!
Very nice, I only use locust so far. Do you know it?
Thank you, This Locust? code.google.com/archive/p/locust-security/
I'm sorry, but I have to point out the voicecrack at 22:34
Extremely outstanding tutorial nonetheless.
how do you make these machine vulnerble, Im doing project on pen testign tools and i want to know how to make these machine more vulnerble
Download Metasploitable and install it in an offline lab. Metasploitable it's a server that comes with vulnerabilities or just misconfigure smb, or certificates, or whatever on a machine inside a lab.
Thank you red ghost
I have an open port on an ipad and want to FTP or get the images from it. What command or script should I use?
There's a million ways to get images of an iPad, including the common ones like airdrop, SMS, email, etc. Or mounting the device as a external drive....I am not sure why you would be looking for a script or using FTP....
what are those ip address in iplist ? where did you get those from?
Those are from my private network and used just for the video.
nice information
Good stuff
Glad you enjoyed
Impressive...Subbed too
Thanks for the sub!
That's what we want !!
Thanks Broo
Hello Nielsen i want to ask You about how did You achieved whole environment on video to practice all the things. I mean if there is somewhere video about configurating other VM's OS in Network with open ports etc, i installed Kali-Linux and also 4 other Windows VMs but during scanning all ports are closed/filtered. I tried to find video about it on Your channel but without success. Thanks for reply in advantage! I support also Your channel soon because i can learn alot of things here
Hello and Welcome!
I plan to create a video on how to setup a lab, similar to mine for testing in the near future. It will be sooner than later, after my next video that I have already started.
what to do if all 1000 ports are filtered tcp ports?
@@Anonymous51701 thanks man, btw, the oracle virtualbox doesn't work for me anymore, when i try to run Kali Linux it gives me an error that says something about the virtual memory. I Tried everything to fix it but it doesn't work, you know why?
(23:29) - marker, randomize scan
Can you make video on how to start, explore and find career path in cybersecurity
Maybe in the future.
I have a question for anyone who wanna help
When I run service and version scan I get a warning message
"retransmission cap hit (10)"
Still didn't find any solution online tho I'll be looking any help is gonna be well received
Hi,
The message "retransmission cap hit (10)" in the context of Nmap scans indicates that Nmap sent a certain number of retransmissions a target and reached a predefined cap of 10 retransmissions without receiving a response. This can happen for various reasons, and there are a few potential explanations and solutions:
Use the --scan-delay option to add a delay between probes: nmap --scan-delay 1s
Use the --max-retries option to limit the number of retries: nmap --max-retries 2
Use a combination of --max-retries and --max-scan-delay: nmap --max-retries 1 --max-scan-delay 10s
Use nmap -T0 to modify the timing. Note you can use T0 thru T5
See if that helps, otherwise it may be the firewall on the device you're scanning.
i have virtual victim machine up but not detecting from nmap I'm still at 4:01........ help
Is the VM on the same network as the machine you're scanning from?
@@NNAdmin yes and i can ping to it, but i found out its the fire wall at default. i dont know what the inbound or outbound setting is preventing nmap. the wierd part is nmap works on my host computer that has norton security