Nmap Network Scanning Guide -

The results flickered across the screen: "12 hosts up." Alex had their targets. Chapter 2: Peering Through the Windows (Port Scanning)

Chapter 3: Identifying the Occupants (Service & OS Detection) Nmap Network Scanning Guide

The terminal revealed a critical detail: Port 80 wasn't just a generic web server; it was running an outdated version of Apache. Alex also saw that the target was likely a machine. Chapter 4: The Deep Dive (Nmap Scripting Engine) The results flickered across the screen: "12 hosts up

The scripts cross-referenced the service versions with known CVE (Common Vulnerabilities and Exposures) databases. Within seconds, the screen flashed red: The outdated Apache version was susceptible to a known exploit. Chapter 5: The Final Report (Output) Chapter 4: The Deep Dive (Nmap Scripting Engine)

With the list of active hosts, Alex needed to know which "doors" were open. They ran a ( nmap -sS ), often called a "stealth scan" because it never fully completes the TCP connection, making it harder for simple firewalls to log. Port 80 (HTTP): Open. A web server. Port 22 (SSH): Open. Remote access. Port 445 (SMB): Filtered. Likely behind a firewall.