How TO Install Nmap In Termux?

How TO Install Nmap In Termux?
Nmap

Nmap is an abbreviation of ‘Network Mapper’, which is a very well known free and open source hackers tool. It is used for network discovery and security auditing. Literally thousands of system admins all around the world are using nmap for network inventory, check for open ports, manage service upgrade schedules, and monitor host or service uptime. Nmap, as a tool uses raw IP packets in creative ways to determine what hosts are available on the network, what services (application name and version) those hosts are providing information about, what operating systems (fingerprinting) and what type and version of packet filters/ firewalls are being used by the target.

Installation
Open termux and type the following commands step by step.
  • pkg update
  • pkg install nmap

Nmap Commands :

Nmap Target Selection :-
  • Scan a single IP: nmap 192.168.1.1
  • Scan a host: nmap www.testhostname.com
  • Scan a range of IPs: nmap 192.168.1.1-20
  • Scan a subnet: nmap 192.168.1.0/24
  • Scan targets from a text file: nmap -iL list-of-ips.txt
Nmap Port Selection :-
  • Scan a single Port: nmap -p 22 192.168.1.1
  • Scan a range of ports: nmap -p 1-100 192.168.1.1
  • Scan 100 most common ports (Fast): nmap -F 192.168.1.1
  • Scan all 65535 ports: nmap -p- 192.168.1.1
Nmap Port Scan types :-
  • Scan using TCP connect: nmap -sT 192.168.1.1
  • Scan using TCP SYN scan (default): nmap -sS 192.168.1.1
  • Scan UDP ports: nmap -sU -p 123,161,162 192.168.1.1
  • Scan selected ports - ignore discovery: nmap -Pn -F 192.168.1.1
Nmap Output Formats :-
  • Save default output to file: nmap -oN outputfile.txt 192.168.1.1
  • Save results as XML: nmap -oX outputfile.xml 192.168.1.1
  • Save results in a format for grep: nmap -oG outputfile.txt 192.168.1.1
  • Save in all formats: nmap -oA outputfile 192.168.1.1
HTTP Service Information :-
  • Gather page titles from HTTP services: nmap --script=http-title 192.168.1.0/24
  • Get HTTP headers of web services: nmap --script=http-headers 192.168.1.0/24
  • Find web apps from known paths: nmap --script=http-enum 192.168.1.0/24
  • Heartbleed Testing: nmap -sV -p 443 --script=ssl-heartbleed 192.168.1.0/24
  • IP Address information :-
  • Find Information about IP address: nmap --script=asn-query,whois,ip-geolocation-maxmind 192.168.1.0/24
  • Anonsagar
    Anonsagar Founder of Tritech and creator of "Anonsagar Cyber " blog that you are currently previewing. Through this blog and youtubechannel, my attempt is to teach basics and those coding techniques to people in short time which took me ages to learn. 6 min read