Cyber Research Wiki

Nmap

Nmap is a widely used, open-source scanner for network exploration and security auditing that discovers hosts, enumerates open ports and services, identifies software/OS fingerprints, and supports extensible scripting for higher-level checks.

Overview

Developed by the Nmap Project, Nmap supports core security workflows by conducting host discovery, port and service enumeration, OS and device fingerprinting, and extensible script-driven checks. It is applied in penetration testing, incident response, asset discovery, and control validation. A graphical interface (Zenmap) and companion utilities such as Ndiff assist with visualization and change tracking. Structured outputs, notably XML enriched with CPE tags, facilitate integration with broader security platforms and reporting pipelines.

What It Is

Nmap is a general-purpose network scanner that uses raw IP packets and targeted application-layer probes to characterize network exposure. It infers service presence and attributes from target responses to crafted probes, consolidates results into per-host findings, and can invoke Lua-based scripts via the Nmap Scripting Engine to perform additional discovery, safety-checked vulnerability detection, and policy validation.

How It Works

Nmap first performs host discovery using probes such as ARP, ICMP, TCP, and UDP to identify responsive targets. It then conducts port scanning with multiple techniques (e.g., TCP SYN and UDP probes) to classify port states (open, closed, filtered, and related categories). Service and version detection sends protocol-specific probes and matches responses against a maintained signature set. OS detection applies TCP/IP stack fingerprinting to correlate observed behaviors with known operating systems and device types. Integrated traceroute estimates hop count and path characteristics. The Nmap Scripting Engine executes categorized scripts (e.g., discovery, auth, vuln) with optional arguments to extend checks. Output is available in human-readable and machine-parsable forms, including XML annotated with CPE identifiers for downstream correlation and differential analysis.

Core Concepts

Typical Workflow

Use Cases

Limitations

Related Tools

Evidence Gaps

Sources

Confidence

high