Week 12
Introduction to Nmap and Responsible Network Scanning
Use Nmap responsibly to discover hosts and open ports on approved lab systems only.
Lesson recap
Learning goals
- Explain what Nmap does
- Run a basic Nmap scan on an approved target
- Identify open ports and services
- Understand the legal and ethical rules of scanning
- Document scan results clearly
Key terms
Nmap
Network Mapper — a scanner used to discover hosts and services.
Port
A numbered endpoint (0–65535) where a service listens.
Service
A program listening on a port (HTTP on 80, SSH on 22).
TCP SYN scan (-sS)
Default scan: sends SYN, watches for SYN-ACK, never completes the handshake.
Service/version detection (-sV)
Tries to identify which exact software is running on each open port.
Authorized Target
A device you have explicit written permission to scan.
Curated videos
Nmap Tutorial for Beginners — What is Nmap?
HackerSploit
NMAP Tutorial for Beginners — Network Scanning
Simplilearn
Commands
nmap --versionnmap -sn 192.168.56.0/24nmap 192.168.56.101nmap -sV 192.168.56.101nmap --top-ports 100 192.168.56.101nmap -p- 192.168.56.101nmap -sV -oA Week12_scan 192.168.56.101Checkpoint checklist
- Nmap installed
- Reviewed responsible scanning rules
- Ran scan against approved target
- Identified open ports
- Wrote short scan report
- Saved required evidence
- Answered the reflection questions
Pro tips from the instructor
- ★Scanning a system without permission may violate the Computer Fraud and Abuse Act (US) and similar laws worldwide. Permission isn't optional.
- ★`-p-` scans all 65535 ports and is loud — only run it when you mean to.
- ★Nmap on Windows requires Npcap; the installer prompts for it. Don't skip it.
Try this — stretch exercises
Optional hands-on practice that goes beyond the workbook. Check items off as you complete them — progress saves in this browser.
- Scan your own VM at 127.0.0.1. Compare the open ports to `netstat -an` on the same VM — they should match.
- Run `nmap -A` against your lab target (aggressive scan: OS detection + version + scripts + traceroute) and read every line of output.
Files to save this week
- 📁 Week12_NmapInstall_YourLastName.png
- 📁 Week12_NmapScan_YourLastName.png
- 📁 Week12_NmapReport_YourLastName