Deploy your apps to a supercloud in a few clicks

This Engineering Education program is supported by Section. Instantly deploy your GitHub apps, Docker containers or K8s namespaces to a supercloud.

Try It For Free

Introduction to Nmap

February 2, 2021

Nmap (network mapper) is the leading security scanning tool used by testers (penetration testers/ethical hackers). In this tutorial, we will discuss the concepts and usage of Nmap along with its most commonly used commands to perform port scans.

What is a Network Mapper?

This is a command-line tool based on a Linux environment used to discover and audit networks, scan, and check vulnerabilities on Internet Protocol (IP) addresses and ports for a given network.

For instance, if you’re a network administrator, an IT manager, or just a security professional in your organization. One of the critical challenges you will face is a battle of getting to know what is running on your network and the kind of security issues/challenges they pose.

There are several tools (Nmap included) available for Network Administrators to use to monitor their network and get real-time activities on their network from these challenges.

With this Nmap tool,

  • Network administrator(s) can identify all devices that are running/accessing their systems.
  • An administrator can identify all the hosts, computers connected to their network, including the services that they offer.
  • An administrator can scan all the open ports (communication endpoint), giving security a priority, that is, security threat detections.
  • An administrator can scan/monitor a single host (a computer connected to the organization network) or thousands of devices connected.

As discussed in the beginning, Nmap is by far the most commonly used network scanning tool. It’s a port scanning tool, meaning it gathers information from these ports. This information is commonly known as network packets (consists of control information and user data, i.e., payload), then it’s sent to system ports.

Nmap is a port listener. It can listen for responses in the process. It can determine whether a port is open or closed or filtered in one way or another by the firewall (a system designed to deny unauthorized users access to or from a private network).

It’s a flexible and versatile tool, meaning it can adapt/change to different activities and functions.

Note: Port scanning could also be referred to as enumeration or port discovery. We will use these terms interchangeably, while they mean the same thing.

Example 1.1 Simple port scan ‘’

jumamiller@janabi$ nmap
Starting Nmap 7.91 ( ) at 2021-01-12 08:36 EAT
Nmap scan report for (
Host is up (0.40s latency).
Other addresses for (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f
Not shown: 866 closed ports
1/tcp     open     tcpmux
7/tcp     open     echo
22/tcp    open     ssh
42/tcp    open     nameserver
53/tcp    filtered domain
80/tcp    open     http
146/tcp   open     iso-tp0
211/tcp   open     914c-g
306/tcp   open     unknown
366/tcp   open     odmr
407/tcp   open     timbuktu
417/tcp   open     onmux
481/tcp   open     dvs
541/tcp   open     uucp-rlogin
563/tcp   open     snews
593/tcp   open     http-rpc-epmap
668/tcp   open     mecomm

Getting started

Nmap was initially developed to run only on Unix based systems. The Windows version was released in 2000, but with a few limitations including:

  • Microsoft dropped the support for raw TCP/IP socket, it has proven hard to scan various VPN clients since Nmap supports ethernet interfaces only.
  • Windows Networking APIs are known to have several deficiencies therefore they are not efficient enough.
  • Scanning your machine from itself has proven hard to execute, hence impossible.

Nmap installation

In this tutorial, we will be using a Linux based system,

jumamiller@janabi$ lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description:    Ubuntu 20.04.1 LTS
Release:    20.04
Codename:   focal

You’re free to follow along with MacOs and Windows.

To install Nmap in Ubuntu:


  • Sudo privileges - you should have the installation rights on the system.
  • Access to an Ubuntu terminal (Ctrl + T).
  • An advanced package tool (apt) package manager or snap store.

Step 1: Updating package list

Before installing Nmap in your system, ensure that your software packages are up-to-date by running the following command:

  sudo apt-get update
jumamiller@OpijaKaeli:~$ sudo apt-get update

[sudo] password for jumamiller: 
Hit:1 focal InRelease                      
Hit:2 stable InRelease                   
Hit:3 focal-updates InRelease              
Hit:4 focal-backports InRelease            
Hit:5 focal InRelease            
Hit:6 focal InRelease                 
Hit:7 focal-security InRelease
Reading package lists... Done

Step 2: Install Network Mapper (Nmap)

Now that our system is up-to-date run the following command to install Nmap:

 sudo apt-get install nmap

The expected output:

jumamiller@OpijaKaeli:~$ sudo apt-get install nmap
Reading package lists... Done
Building dependency tree       
Reading state information... Done
The following additional packages will be installed:
  libblas3 liblinear4 lua-lpeg nmap-common
Suggested packages:
  liblinear-tools liblinear-dev ncat ndiff zenmap
The following NEW packages will be installed:
  libblas3 liblinear4 lua-lpeg nmap nmap-common
0 upgraded, 5 newly installed, 0 to remove and 241 not upgraded.
Need to get 5,553 kB of archives.
After this operation, 26.3 MB of additional disk space will be used.
Do you want to continue? [Y/n]

Press y to proceed.

That should present the following screen:

Do you want to continue? [Y/n] y
Get:1 focal/main amd64 libblas3 amd64 3.9.0-1build1 [142 kB]
Get:2 focal/universe amd64 liblinear4 amd64 2.3.0+dfsg-3build1 [41.7 kB]
Get:3 focal/universe amd64 lua-lpeg amd64 1.0.2-1 [31.4 kB]
Get:4 focal/universe amd64 nmap-common all 7.80+dfsg1-2build1 [3,676 kB]
Get:5 focal/universe amd64 nmap amd64 7.80+dfsg1-2build1 [1,662 kB]
Fetched 5,553 kB in 34s (162 kB/s)                                             
Selecting previously unselected package libblas3:amd64.
(Reading database ... 213214 files and directories currently installed.)
Preparing to unpack .../libblas3_3.9.0-1build1_amd64.deb ...
Unpacking libblas3:amd64 (3.9.0-1build1) ...
Selecting previously unselected package liblinear4:amd64.
Preparing to unpack .../liblinear4_2.3.0+dfsg-3build1_amd64.deb ...
Unpacking liblinear4:amd64 (2.3.0+dfsg-3build1) ...
Selecting previously unselected package lua-lpeg:amd64.
Preparing to unpack .../lua-lpeg_1.0.2-1_amd64.deb ...
Unpacking lua-lpeg:amd64 (1.0.2-1) ...
Selecting previously unselected package nmap-common.
Preparing to unpack .../nmap-common_7.80+dfsg1-2build1_all.deb ...
Unpacking nmap-common (7.80+dfsg1-2build1) ...
Selecting previously unselected package nmap.
Preparing to unpack .../nmap_7.80+dfsg1-2build1_amd64.deb ...
Unpacking nmap (7.80+dfsg1-2build1) ...
Setting up lua-lpeg:amd64 (1.0.2-1) ...
Setting up libblas3:amd64 (3.9.0-1build1) ...
update-alternatives: using /usr/lib/x86_64-linux-gnu/blas/ to provide /usr/lib/x86_64-linux-gnu/ ( in auto mode
Setting up nmap-common (7.80+dfsg1-2build1) ...
Setting up liblinear4:amd64 (2.3.0+dfsg-3build1) ...
Setting up nmap (7.80+dfsg1-2build1) ...
Processing triggers for man-db (2.9.1-1) ...
Processing triggers for libc-bin (2.31-0ubuntu9) ...

Alternatively, install Nmap using snaps by running the following command:

$ sudo snap install nmap

Step 3: Verify installed version:

To confirm the version of the Nmap you have just installed, run the following command:

nmap --version

At the time of this writing, Nmap version command outputs the following:

jumamiller@OpijaKaeli:~$ nmap --version
Nmap version 7.80 ( )
Platform: x86_64-pc-linux-gnu
Compiled with: liblua-5.3.3 openssl-1.1.1d nmap-libssh2-1.8.2 libz-1.2.11 libpcre-8.39 libpcap-1.9.1 nmap-libdnet-1.12 ipv6
Compiled without:
Available nsock engines: epoll poll select

NOTE: Your version might be different.

If you have made it this far, you have installed Nmap successfully in your system.

Step 4: Nmap Scanning Types:

DISCLAIMER!! - The information given in this module is solely for use to scan your networks or networks for which you have been authorized to scan. DO NOT scan networks that you have not been given access or permission to scan, or in case of lawsuits, I hereby disclaim any responsibility for any action taken based on this information presented in this tutorial.

There are several scan types used in Nmap:

  • TCP connect() SCAN.
  • SYN Stealth SCAN or half-open, or stealth scanning.
  • RPC SCAN. et cetera…

In this tutorial, we will be looking at the two commonly used scans:

TCP Scan

Nmap TCP Scan works by establishing a connection between its underlying operating network and the target system via a connect() system call. If it succeeds, it creates a 3-way handshake, a TCP process to create/make a connection between the client and the server. Otherwise, the port is closed and/or the remote target system is offline and cannot be accessed.

When a connection has been established, the ports are listed as open while the non-established connection is listed as closed.
From the example above, you can notice that if a port is listed as open, you can connect to it, and that is what we refer to as scanning a port.

TCP scan has an option that is usually used when scanning a port, -sT.

Example 1.2: Simple port scan ‘’ using TCP Scan -sT [target] command

On your terminal, run the following command:

sudo nmap -sT

This outputs the following:

jumamiller@OpijaKaeli:~$ sudo nmap -sT 
Starting Nmap 7.80 ( ) at 2021-01-12 11:18 EAT
Nmap scan report for (
Host is up (0.36s latency).
Other addresses for (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f
Not shown: 993 closed ports
22/tcp    open     ssh
53/tcp    filtered domain
80/tcp    open     http
3784/tcp  filtered bfd-control
9929/tcp  open     nping-echo
31337/tcp open     Elite
35500/tcp filtered unknown

Nmap done: 1 IP address (1 host up) scanned in 75.95 seconds

We have 4 ports open from the output above from the remote target, nmap. From this output, we can perform various operations that are beyond the scope of this tutorial.

Albeit we can scan for open ports using this TCP SYN scan technique, although it has several drawbacks:

It can be easily detected on the system (remote) being scanned. Now imagine this remote system (in this case, the victim) is running an intrusion detection system or has a firewall.

Every single attempt you make to scan a port sends or triggers a warning to the administrator together with logs. Once again, do not scan big techs because they will watch you!!!

Due to this drawback, SYN Stealth Scan [-sS] was developed.

SYN Stealth Scan

In simple terms, SYN scan is used by the penetration tester without establishing a full connection, hence the name half-open scanning.

For example, you want to scan a remote server. You will establish a TCP/IP connection with a server at every possible open port by sending an SYN packet (synchronization packet) as if to create a 3-way handshake to every single port.

If the synchronization is acknowledged, the server responds with a SYN/ACK packet from a particular port, then that particular port is open.

From that point, you can send a reset packet (RST); consequently, the server assumes that an error occurred while establishing a connection, yet the open port remains open and ready/vulnerable to exploitation.

The client may send several SYN packets to the server, consuming a lot of resources. This way, legitimate requests cannot be handled. This is one-way DOS (Denial of service) is achieved.

Now that we’ve got an idea of how SYN Scan works let’s look at an example:

Example 1.3: Simple port scan ‘’ using TCP Scan -sS [target] command

On your terminal, run the following command:

sudo nmap -sS

This outputs the following:

jumamiller@OpijaKaeli:~$ sudo nmap -sS
[sudo] password for jumamiller: 
Starting Nmap 7.80 ( ) at 2021-01-12 11:16 EAT
Nmap scan report for (
Host is up (0.42s latency).
Other addresses for (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f
Not shown: 994 closed ports
22/tcp    open     ssh
53/tcp    filtered domain
80/tcp    open     http
3784/tcp  filtered bfd-control
9929/tcp  open     nping-echo
31337/tcp open     Elite

Nmap done: 1 IP address (1 host up) scanned in 46.24 seconds

From the output above, you’ll notice that the results are relatively the same as the TCP Scan output. The only difference between the two methods is that a TCP Scan logs any single port scan, therefore it leaves traces to the target system administrator(s).


In this tutorial, we discussed Nmap, a tool that is used to scan Networks. We have discussed how to install Nmap in Linux distribution and we performed several scans, including a TCP Scan and a SYN Steal scan.

There are several other Scan Types that we will explore in our next tutorial.

Happy Coding!

Peer Review Contributions by: Lalithnarayan C