Nmap


Also found in: Acronyms, Wikipedia.

Nmap

(Network MAPper) A free, open source security scanner for auditing networks that runs on most platforms and written by Fyodor (a person). When aimed at a particular host, Nmap can determine which ports are open, which OS and version is running, what services are offered and what firewalls are used. For more information, visit www.insecure.org/nmap.
References in periodicals archive ?
The command for such an audit--using the NMAP Network Scanner is: /usr/bin/nmap -sP(IP address range)
The NMAP authors plead for an end to the debates over which teaching methods are best.
This advisory is being issued by the Brookdale Center on Aging, as part of the NMAP The purpose of the project is to bring public attention to the strengths and weaknesses of the Medicare FFS system and managed care options.
For these reasons, NMAP recommended that high priority be assigned to improving performance on fractions, an emphasis reflected in the CCSS.
New offensive tools and host scanning capabilities utilizing Nmap to proactively detect vulnerabilities, identify rogue devices, and shore-up defenses.
Aanval SAS (TM) is the combination of the most advanced SIEM features coupled with the newly released Network Host Scanner, Rogue Host Detection, and Offensive Reconnaissance (TM) that take full advantage of Nmap, the industry's most well-known and accomplished port scanning utility to perform both automated and on-request network reconnaissance.
Sample nmap "ping scan" command for single IP address:
Learn the process of network of enumeration and scanning, and see how Netcat along with other tools such as Nmap and Scanrand can be used to thoroughly identify all of the assets on your network.
Aanval SAS[TM] is the combination of the most advanced SIEM features coupled with the newly released Network Host Scanner, Rogue Host Detection, and Offensive Reconnaissance[TM] that take full advantage of Nmap, the industry's most well-known and accomplished port scanning utility to perform both automated and on-request network reconnaissance.
According to NMAP (2008), many students without documented disabilities struggle with mathematics as well.
In addition, the reviewers indicate they "configured application-side security features, such as Web site cloaking, and attempted to gain network and application configuration via nefarious reconnaissance practices such as identifying operating systems and Web server details through HTTP header data and scanning utilities like Nmap.