Skip to content

Commit 5353a46

Browse files
committed
adjust wording
1 parent 5d6eef8 commit 5353a46

File tree

2 files changed

+20
-21
lines changed

2 files changed

+20
-21
lines changed

pages/api/Using_with_nmap.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,8 @@ This is the shape of the expected payload.
3636
"protocol": "tcp",
3737
"status": "open",
3838
"service": {
39-
"name": "openssh"
39+
"name": "openssh"
40+
"version": "1.1"
4041
}
4142
}
4243
]

pages/user guides/discover_nmap.md

Lines changed: 18 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Discover your Hosts with Nmap
2+
title: Host discovery with Nmap
33
keywords: nmap, ip, address, api, services
44
last_updated: September 2020
55
summary: "How to use nmap to scan your network"
@@ -8,37 +8,33 @@ permalink: discover-nmap.html
88
---
99

1010

11+
As part of your cloud migration journey it is important to have all the tools at your disposal. In addition to [the other discovery methods](https://guides.tidalmg.com), you can use [Nmap](https://nmap.org/) to facilitate a part of the discovery process.
12+
The way it works is very simple and with the full power of Nmap available to you, discovery of even those hard to reach places is possible.
13+
14+
Nmap has developed some powerful capabilities and good [documentation](https://nmap.org/book/host-discovery-find-ips.html) that will allow you to identify all the hosts you have running on your network, the ports and services that they have open and running.
1115

12-
As part of your cloud migration journey it is important to have all the tools at your disposal. In addition to [the other discovery methods](https://guides.tidalmg.com), you can use [Nmap](https://nmap.org/) to facilitate a part of the discovery process.
13-
The way it works is very simple and with the full power of Nmap available to you, discovery of even those hard to reach places is possible.
14-
15-
Nmap has developed some powerful capabilities and good [documentation](https://nmap.org/book/host-discovery-find-ips.html) that will allow you to identify all the hosts you have running on your network, the ports and services that they have open and running.
16-
1716
Nmap is capable of producing its output in an XML file, allowing you to inspect the raw scan output before sending it to the Tidal Migrations API with [Tidal Tools](https://get.tidal.sh). Once uploaded to the Tidal Migrations Platform, you will be able to visualize your network devices, track your complete server inventory and build on this data with other discovery methods, allowing you to make informed decisions on your cloud migration path.
1817

1918

2019
## Using Nmap with Tidal Tools
21-
20+
2221
By leveraging the power of **Tidal Tools** you can send the output generated by Nmap to your Tidal Migrations account.
23-
22+
2423
1. Install [Tidal Tools](https://guides.tidalmg.com/tidal-tools.html)
2524
2. [Login to Tidal Tools](https://guides.tidalmg.com/tidal-tools.html#login) with **tidal login**
26-
3. Run Nmap ([Need to install Nmap?](#installing-nmap)) with the flags of your choosing and save the output to an XML file. For example,
25+
3. Run Nmap ([Need to install Nmap?](#installing-nmap)) with the flags of your choosing and save the output to an XML file. For example,
2726
```
28-
sudo nmap -sS -p80,443,8080,8443,1433,1521,27017 <ip-address> -oX my-network.xml
27+
sudo nmap -sV <ip-address/range> -oX my-network.xml
2928
```
30-
_Note: the **-sS** flag will enable TCP SYN port scan and the **-oX** specifies the output as a XML file. [Want more scanning options?](#nmap-usage)_
29+
_Note: the **-sV** flag will attempt to determine the version of the service running on port and the **-oX** specifies the output as a XML file. [Want more scanning options?](#nmap-usage)_
3130
{% include tip.html content="Be sure to replace <ip-address> with the CIDR range for the network you would like to scan, ex. `10.0.0.0/24`" %}
32-
31+
3332
4. Run this Tidal Tools command to upload your previously generated Nmap output to your Tidal Migrations account
3433
```
3534
tidal sync nmap <filename.XML>
3635
```
36+
5. Head over to your Tidal Migrations account! (https://<account_name>.tidalmg.com/#/labs/host_discovery)
3737
38-
5. Head over to your Tidal Migrations account!
39-
40-
41-
4238
## Installing Nmap
4339
4440
Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.
@@ -47,19 +43,21 @@ You can find all the documentation in its official site [Nmap](https://nmap.org/
4743
4844
4945
## Nmap usage
50-
{% include callout.html content="Note: Currently, Tidal Migrations supports the collection of Hosts (IP addresses), PTR records, their open ports, the ports status, the port protocol (TCP/UDP), and the services running in the port, including the version." type="primary"%}
5146
47+
{% include callout.html content="Note: Currently, Tidal Migrations supports the collection of Hosts (IP addresses), PTR records, their open ports, the ports status, the port protocol (TCP/UDP), and the services running in the port, including the version." type="primary"%}
5248
Nmap offers a wide range of utilities and commands, such as Port scanning, Host discovery, Service and version detection to name a few. Here some basic examples for how to do some nmap scanning.
49+
50+
5351
_NB: Some commands required sudo privilege._
5452
55-
#### Target Specification
53+
### Target Specification
5654
5755
```
5856
nmap 192.168.1.1-254 # Scan a range
5957

6058
```
6159
62-
#### Scan Techniques
60+
### Scan Techniques
6361
6462
```
6563
nmap 192.168.1.1 -sS # TCP SYN port scan (Default)
@@ -70,7 +68,7 @@ nmap 192.168.1.1 -sU # UDP port scan
7068

7169
```
7270
73-
#### Host Discovery
71+
### Host Discovery
7472
7573
```
7674
nmap 192.168.1.1-3 -sL # No Scan. List targets only

0 commit comments

Comments
 (0)