Skip to main content

Nmap Tutorial For Beginner Part - #3

                 Nmap Tutorial For Begginer
      
    Previous Epsiode We Have See Few Articles In The Nmap  But Even Though We Need To Go Further IN The Nmap For Advance But First Of All I Would Like To Know How Many OF you Not Have See The Previous Page In My Blog :
     
    If Not Please Click The Link Here And Read And Come To This Article Then Only You Will BE Able To Understand This Article :
                  
                  ➤➤  https://bit.ly/2uyhOvn  ⮜⮜

Ok ! Then We Can Now Talk About The Nmap.

➡️Now First Of All We Need A Website (or) A Target Machine To Attack.
➡️ If You Have A Website Then No Problem 😃.
➡️ Or You Can Use Your Own Windows Or A Other "OS".
➡️ Then Come On Let's Rock It.


So For That purpose I Am Using My Own "IP Address".
And My Ip Is "192.168.xxx.xxx."😝

OK! 

Then Type The Nmap - help
To Get The Help.

                                      Here You Can See The VIDEO For More Details

⬇️



Give The Command 

1) SUDO NMAP -F 
     And The Meaning Is 

➡️FRAGMENT PACKETS⬅️.


2) SUDO NMAP -MTU (8)
   
➡️MAXIMUX TRANFER UNIT⬅️

3) SUDO NMAP -D

➡️TO DECOY THE BOTH IP ADDRESS ⬅️.


SO I Have Kept The Article Little To Understand 
     

CONCLUSION :

        Hope I Think Every Body IS Ok With This Command These Are The Basic Command I Were Used In This Article.
Ok I Will Meet In The Next Article..

                                        BYE ! BYE!

Comments

Popular posts from this blog

What Is Brute Force

  What is a Brute-force attack? A  brute force  attack is an attempt to crack a password or username or find a hidden web page, or find the key used to encrypt a message, using a trial and error approach and hoping, eventually, to guess correctly. This is an old attack method, but it's still effective and popular with hackers. Brute-force attack when an attacker uses a set of predefined values to attack a target and analyze the response until he succeeds. Success depends on the set of predefined values. If it is larger, it will take more time, but there is better probability of success. The most common and easiest to understand example of the brute-force attack is the dictionary attack to crack the password. In this, attacker uses a password dictionary that contains millions of words that can be used as a password. Then the attacker tries these passwords one by one for authentication. If this dictionary contains the correct password, attacker will succeed. ...

penetration Testing

                                      W What Is Penetration Testin g Penetration Testing                                 Penetration testing can help you improve both the security and quality of your product. It’s a complex yet creative process where you must understand what you’re doing and why you’re doing it. It's like in the movie. where hacker-consultants break into your corporate networks to find weaknesses before attackers do. It’s a simulated cyber attack where the pentester or ethical hacker uses the tools and techniques available to malicious hackers. Back in ye olde days of yore, hacking was hard and required a lot of manual bit fiddling. Today, though, a full suite of automated testing tools turn hackers into cyborgs, computer-enhanced humans who can test far more than ever before. ...

Types Of Ethical Hackers

Types Of Hackers And Its Information Hi Today Video Is About What Is Ethical Hacking Most If Us Where Thing That’s Hacking Is A  Crime And Hacking Is Illegal… But In The Modern Technology Hacking IS Leads To EveryThing But why Hacking has many types  And there are many types of Hackers in the world but here about it we should know what are the types of hackers in the world And we are going to learn here  First Of All Who Is A Hacker A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security. ... Script kiddies: A non-skilled person who gains access to computer systems using already made tools A Hacker is a person who is intensely interested in the mysterious workings of any computer operating system. Hackers are most often programmers. They gather advanced knowledge of operating systems and programmin...