On top of that, network and system administrators use Nmap for tasks such as network inventory, monitoring host and service uptime, managing service upgrade schedules and more.
Flexible and powerful network discovery tool
Nmap is designed to use raw IP packets in order to determine what hosts are available on the network, the services those host are offering and what operating systems they are running. You can also use Nmap to find out what type of packet filters and firewalls are in use, as well as many other characteristics.
Thanks to Nmap you can quickly scan large networks or use it against single hosts form the Terminal window. In addition to the command-line Nmap executable, the Nmap suite also offers a powerful GUI and results viewer (Zenmap), a handy utility for scan results comparison (Ndiff), a versatile data transfer, redirection and debugging tool (Ncat), and a packet generation and response analysis tool (Nping).
Try different port scanning mechanisms and collect the needed data
Nmap comes with numerous advanced techniques for mapping out networks filled with IP filters, routers, firewalls and other interferences. This covers a wide variety of port scanning mechanisms, version detection, OS detection, ping sweeps and more.
Choose between the command line and GUI version based on your preferences
Although Nmap provides a comprehensive set of powerful features, its command line and graphical versions can be used by both novice and experienced users. Thus, Nmap can be used as an advanced tool for exploring networks in order to make it more secure.
In conclusion, Nmap is a trustworthy and user-oriented utility that provides a rich set of advanced features for both power users and novices who are interested in performing network and security related tasks.
Reviewed by George Popescu on September 10th, 2014
In a hurry? Add it to your Download Basket!
- Integrated all of your IPv4 OS fingerprint submissions since June 2013 (2700+ of them). Added 366 fingerprints, bringing the new total to 4485. Additions include Linux 3.10 - 3.14, iOS 7, OpenBSD 5.4 - 5.5, FreeBSD 9.2, OS X 10.9, Android 4.3, and more. Many existing fingerprints were improved. Highlights: http://seclists.org/nmap-dev/2014/q3/325 [Daniel Miller]
- Removed the External Entity Declaration from the DOCTYPE in Nmap's XML. This was added in 6.45, and resulted in trouble for Nmap XML parsers without network access, as well as increased traffic to Nmap's servers. The doctype is now:
- [Ndiff] Fixed the installation process on Windows, which was missing the actual Ndiff Python module since we separated it from the driver script. [Daniel Miller]
- [Ndiff] Fixed the ndiff.bat wrapper in the zipfile Windows distribution, which was giving the error, "\Microsoft was unexpected at this time." See https://support.microsoft.com/kb/2524009 [Daniel Miller]
Application descriptionNmap ("Network Mapper") is useful for tasks such as network inventory, managing service upgrade schedules, and monitor...