-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
⭐️ nmap provider #4168
Merged
Merged
⭐️ nmap provider #4168
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This comment has been minimized.
This comment has been minimized.
tas50
reviewed
Jun 3, 2024
tas50
reviewed
Jun 3, 2024
tas50
reviewed
Jun 3, 2024
tas50
reviewed
Jun 3, 2024
tas50
reviewed
Jun 3, 2024
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
chris-rock
force-pushed
the
chris-rock/nmap
branch
from
August 19, 2024 10:58
f7b3fb6
to
d51bd70
Compare
chris-rock
force-pushed
the
chris-rock/nmap
branch
from
September 9, 2024 12:22
d51bd70
to
cf05132
Compare
chris-rock
force-pushed
the
chris-rock/nmap
branch
2 times, most recently
from
October 4, 2024 12:09
d4657a4
to
6b9b283
Compare
This comment has been minimized.
This comment has been minimized.
For discovery:
For service detection:
|
chris-rock
force-pushed
the
chris-rock/nmap
branch
from
December 14, 2024 20:40
6b9b283
to
8eabbf2
Compare
This comment has been minimized.
This comment has been minimized.
just to do a very fast ip discovery without scanning any port:
|
chris-rock
force-pushed
the
chris-rock/nmap
branch
from
December 14, 2024 20:45
8eabbf2
to
42a2a8c
Compare
This comment has been minimized.
This comment has been minimized.
make a port scan just for the discovered hosts/ips
|
chris-rock
force-pushed
the
chris-rock/nmap
branch
from
December 14, 2024 20:51
42a2a8c
to
3d8f296
Compare
chris-rock
force-pushed
the
chris-rock/nmap
branch
from
December 15, 2024 00:16
3d8f296
to
44d6b90
Compare
chris-rock
force-pushed
the
chris-rock/nmap
branch
from
December 15, 2024 00:23
44d6b90
to
52a21eb
Compare
atomic111
approved these changes
Dec 15, 2024
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@chris-rock awesome. thank you for the new nmap provider
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
nmap provider
Nmap, short for Network Mapper, is a powerful and versatile open-source tool used for network discovery and security auditing. This tool is widely utilized by network administrators, security professionals, and penetration testers to map out network structures, discover hosts, identify services, and detect vulnerabilities.
The nmap provider maps primary objects and attributes that nmap uses to store and manage information about scanned targets, discovered hosts, and their associated ports and services.
Pre-requisites
This provider requires the nmap tool to be installed on your system. You can download and install nmap from the official website.
Get Started
Example
Scan active IP address in network
Host scan with specific ip
Advanced Usage
Discover all exposed hosts on a network.
cnquery shell nmap --networks "192.168.0.0/20" --discover hosts
Connect to a specific IP address and display all open ports.
Verifying the Installation of nmap
To verify the installation of nmap, run the following command: