Share this page

Learn X in Y minutes

Where X=Nmap

Learn Nmap in Y Minutes

So, you’re connected to a network and want to know what else is connected to it. Maybe you’re trying to find that mystery device eating up bandwidth or check if there are services running you didn’t know about, or you just want to verify what ports are exposed on your machine?

Meet your swiss-army network knife named Nmap!


Introduction

Nmap 101
Nmap is an open-source network scanning tool built by Gordon Lyon. Designed to help you find devices, open ports and services across your network. It’s a swiss-army knife for network admins, security folks, dev's and anyone curious about what’s living on their network.

When to Use It

When Not to Use It

Certain scans are intrusive and can trigger security alarms, so stick to **only ** scanning networks or systems where you have permission. Unauthorized scanning can be considered illegal under cybersecurity laws in many regions, and companies might view it as a hacking attempt.

Use Nmap extensively and wisely.


Installation

Installation is straightforward, thoroughly explained on nmap.org - install


The Basics

These are low-key scans that safe to use since they don’t do deep probing.


Moving Up: More Insightful Scans

These scans dig a bit deeper, so they may trigger alarms on security systems. Use these only on networks where you have explicit permission to scan.


Advanced Scans: When You’re the Power User

So, you’re getting into the advanced stuff—maybe testing your own firewall or finding rogue services. The following scans are loud and intrusive that definitely trigger security defenses.


Practical Tips and Tricks

Timing Templates
Nmap has timing options from -T0 (paranoid) to -T5 (insane). Stick with -T2 or -T3 for a good balance between speed and not making too much noise. More on nmap - timing-templates

Check Out Nmap’s Scripts
NSE scripts make Nmap super versatile. From DNS enumeration to vulnerability checks, there’s probably a script for whatever you need. More on nmap - Nmap Scripting Engine

Use aggressive scans and decoys only on networks you own or with formal authorization, such as during a penetration test with client permission. If you’re running scans at work, talk to the network admins first.

Know When to Stop
Once you’ve got the info you need, wrap it up. It’s easy to get scan-happy.


Happy scanning!


Got a suggestion? A correction, perhaps? Open an Issue on the GitHub Repo, or make a pull request yourself!

Originally contributed by Sebastian Oberdorfer, and updated by 2 contributors.