What does the network scanning mean? Network scanning refers to do with a computer network
to collect all information about computing systems. It is basically used for
security assessment and system maintenance. Hacker also uses it for attacks. Vulnerability
scanning is one of the network scanning. It works for identifies
vulnerabilities of a computer system. It also can detect weak port and launch
exploit. Now I want to introduce a port scanning tool about Network Mapped
(Nmap). It’ free of charge to use and open source utility. Nmap can run on many
platforms, it runs on all operating system (OS), such as Window, Solaris, IRX,

Now I would list some features and
function about Nmap. One of the features is host discovery, it can attempt to identify
the live host on the network. Even the ruleset of the firewall is set
definitely, it also can identify the number of hosts. It can be used to scan the large network in a single run with
efficiency. It also can detect the version and operating system of the

of the security tools have advantage and disadvantage. Nmap has a lot of
advantage, one of the advantages is that send a well-crafted packet to the
destination. Nmap also can scan the network for various vulnerabilities. It able
to create a visual network of machine with Zenmap GUI. The
disadvantage of Nmap is port-scanning has some flaws. It could make a DOS or
network slowdown while is scanning weaker devices even though can be remedied
by slowing down the scan speed.

Now I’d show some usage of Nmap. I’d use Nmap to ping
scan the network, listing machines that respond to ping with this command “nmap
–sP Ip range”.

We will write a custom essay sample on
What Nmap commands and supports all of the
Specifically for you for only $16.38 $13.9/page

order now





I can open a Nmap front end called
Zenmap with this command “nmapfe”. It is a GUI made on top of Nmap. The reason
I use Zenmap is that it provides a user-friendly output of Nmap commands and
supports all of the features Nmap does.

I also can view all the live host on
the network with this command “nmap –v3 Ip range”.


I can scan 2 or more type of scan in
a command. Below are OS detection and UDP scanning with this command “nmap –sS
–O  IP range”.

There’s have other tools
for the network. One of the tools called Nessus, let’s compare it with the
Nmap. NMAP and Nessus can both be considered network security scanners, but there
are some differences between them. Firstly which are the ways output is
presented to the user. The data output of Nmap is text-based whether you use
the GUI or command line. Nessus has shown the information with more graphical. Nessus
is more focus on scanning vulnerability whereas NMAP is used for mapping a
network’s hosts. The major function of Nessus is to provide security scanning
capabilities to its user. It can do network discovery like Nmap, but it is created
to scan systems to identify their vulnerabilities, unlike Nmap. Because of what
Nessus can do, it can be applied in security audits, asset profiling, and
vulnerability analysis. Nmap can do all of these, but it would take a lot of
work. However, if your focus more is making sure any vulnerabilities are
discovered, then Nessus is more suitable. If you are a penetration security
engineer, Nmap may complete the job because of its features and utility.


I'm Dora!

Would you like to get a custom essay? How about receiving a customized one?

Click here