You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: pages/user guides/discover_nmap.md
+18-20Lines changed: 18 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Discover your Hosts with Nmap
2
+
title: Host discovery with Nmap
3
3
keywords: nmap, ip, address, api, services
4
4
last_updated: September 2020
5
5
summary: "How to use nmap to scan your network"
@@ -8,37 +8,33 @@ permalink: discover-nmap.html
8
8
---
9
9
10
10
11
+
As part of your cloud migration journey it is important to have all the tools at your disposal. In addition to [the other discovery methods](https://guides.tidalmg.com), you can use [Nmap](https://nmap.org/) to facilitate a part of the discovery process.
12
+
The way it works is very simple and with the full power of Nmap available to you, discovery of even those hard to reach places is possible.
13
+
14
+
Nmap has developed some powerful capabilities and good [documentation](https://nmap.org/book/host-discovery-find-ips.html) that will allow you to identify all the hosts you have running on your network, the ports and services that they have open and running.
11
15
12
-
As part of your cloud migration journey it is important to have all the tools at your disposal. In addition to [the other discovery methods](https://guides.tidalmg.com), you can use [Nmap](https://nmap.org/) to facilitate a part of the discovery process.
13
-
The way it works is very simple and with the full power of Nmap available to you, discovery of even those hard to reach places is possible.
14
-
15
-
Nmap has developed some powerful capabilities and good [documentation](https://nmap.org/book/host-discovery-find-ips.html) that will allow you to identify all the hosts you have running on your network, the ports and services that they have open and running.
16
-
17
16
Nmap is capable of producing its output in an XML file, allowing you to inspect the raw scan output before sending it to the Tidal Migrations API with [Tidal Tools](https://get.tidal.sh). Once uploaded to the Tidal Migrations Platform, you will be able to visualize your network devices, track your complete server inventory and build on this data with other discovery methods, allowing you to make informed decisions on your cloud migration path.
18
17
19
18
20
19
## Using Nmap with Tidal Tools
21
-
20
+
22
21
By leveraging the power of **Tidal Tools** you can send the output generated by Nmap to your Tidal Migrations account.
_Note: the **-sS** flag will enable TCP SYN port scan and the **-oX** specifies the output as a XML file. [Want more scanning options?](#nmap-usage)_
29
+
_Note: the **-sV** flag will attempt to determine the version of the service running on port and the **-oX** specifies the output as a XML file. [Want more scanning options?](#nmap-usage)_
31
30
{% include tip.html content="Be sure to replace <ip-address> with the CIDR range for the network you would like to scan, ex. `10.0.0.0/24`" %}
32
-
31
+
33
32
4. Run this Tidal Tools command to upload your previously generated Nmap output to your Tidal Migrations account
34
33
```
35
34
tidal sync nmap <filename.XML>
36
35
```
36
+
5. Head over to your Tidal Migrations account! (https://<account_name>.tidalmg.com/#/labs/host_discovery)
37
37
38
-
5. Head over to your Tidal Migrations account!
39
-
40
-
41
-
42
38
## Installing Nmap
43
39
44
40
Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.
@@ -47,19 +43,21 @@ You can find all the documentation in its official site [Nmap](https://nmap.org/
47
43
48
44
49
45
## Nmap usage
50
-
{% include callout.html content="Note: Currently, Tidal Migrations supports the collection of Hosts (IP addresses), PTR records, their open ports, the ports status, the port protocol (TCP/UDP), and the services running in the port, including the version." type="primary"%}
51
46
47
+
{% include callout.html content="Note: Currently, Tidal Migrations supports the collection of Hosts (IP addresses), PTR records, their open ports, the ports status, the port protocol (TCP/UDP), and the services running in the port, including the version." type="primary"%}
52
48
Nmap offers a wide range of utilities and commands, such as Port scanning, Host discovery, Service and version detection to name a few. Here some basic examples for how to do some nmap scanning.
49
+
50
+
53
51
_NB: Some commands required sudo privilege._
54
52
55
-
#### Target Specification
53
+
### Target Specification
56
54
57
55
```
58
56
nmap 192.168.1.1-254 # Scan a range
59
57
60
58
```
61
59
62
-
#### Scan Techniques
60
+
### Scan Techniques
63
61
64
62
```
65
63
nmap 192.168.1.1 -sS # TCP SYN port scan (Default)
0 commit comments