🔍 Nmap Network Scanning Tutorial | ARP, ICMP, TCP, UDP & IP Protocol Scans Explained! ⚡
Автор: Alpha Stack
Загружено: 2025-11-20
Просмотров: 3
Описание:
Welcome to this hands-on Nmap tutorial! 🚀
In this video, I demonstrate *network scanning using Nmap CLI* and explain how different ping-scan techniques help identify live hosts on a network.
No complicated theory — just clean, practical usage with real commands. 🔥
We cover the most commonly used Nmap host-discovery (ping scan) methods, including:
🔹 *1. ARP Ping Scan*
Used in local networks to quickly discover active hosts.
*Command:*
```
nmap -sn -PR [Target IP Address]
```
🔹 *2. UDP Ping Scan*
Sends UDP packets to check if the host responds.
*Command:*
```
nmap -sn -PU [Target IP Address]
```
🔹 *3. ICMP Ping Scans*
Includes ICMP Echo, Timestamp & Address Mask pings — useful when administrators block normal ping.
*Commands:*
```
nmap -sn -PE [Target IP Address]
nmap -sn -PE [Target Range of IP Addresses]
nmap -sn -PP [Target IP Address]
nmap -sn -PM [Target IP Address] (ICMP Address Mask Ping Scan)
```
🔹 *4. TCP Ping Scans (SYN & ACK)*
Used when ICMP is blocked.
*TCP SYN Ping:*
```
nmap -sn -PS [Target IP Address]
```
*TCP ACK Ping:*
```
nmap -sn -PA [Target IP Address]
```
🔹 *5. IP Protocol Ping Scan*
Sends probes using different IP protocols; any response indicates the host is alive.
*Command:*
```
nmap -sn -PO [Target IP Address]
```
Throughout the video, I explain **when to use each scan**, how they work, and what type of response indicates an active host.
Perfect for beginners, ethical hacking students, cybersecurity learners, and anyone practicing network reconnaissance. 💻🔐
If this helped you, don't forget to *LIKE, SHARE & SUBSCRIBE* for more cybersecurity tutorials! ⚡🔥
#️⃣ Hashtags
#Nmap #NetworkScanning #EthicalHacking #CyberSecurity #NmapTutorial #HackingTools #NetworkDiscovery #PacketAnalysis #LearnHacking #NmapCommands #CybersecurityTraining #TechTutorials #Reconnaissance
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: