Nmap Security Scanner
*Ref Guide
Security Lists
Security Tools
Site News
Advertising
About/Contact
Credits
Sponsors





Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News
Preface
Prev   Next

Preface

Table of Contents

Introduction
Intended Audience and Organization
Conventions
Other Resources
Request for Comments
Acknowledgements
Technology used to create this book

Introduction

On September 1, 1997, I released a security scanner named Nmap in the fifty-first issue of Phrack magazine. My goal was to consolidate the fragmented field of special-purpose port scanners into one powerful and flexible free tool, providing a consistent interface and efficient implementation of all practical port scanning techniques. Nmap then consisted of three files (barely 2,000 lines of code) and supported only the Linux operating system. It was written for my own purposes, and released in the hope that others would find it useful.

From these humble beginnings, and through the power of Open Source development, Nmap grew into the world's most popular network security scanner[1], with millions of users worldwide. Over the years, Nmap has continued to add advanced functionality such as remote OS detection via TCP/IP fingerprinting, version/service detection, IP ID idle scanning, and fast multi-probe ping scanning. It now supports all major Unix, Windows, and Mac OS platforms. Both console and graphical versions are available. Publications including Linux Journal, Info World, LinuxQuestions.Org, and the Codetalker Digest have recognized Nmap as “security tool of the year”. It was even featured in several movies, including the 2003 hit The Matrix Reloaded.

Nmap (“Network Mapper”) is a free and open source utility for network exploration and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts.

While Nmap is extremely powerful, it is also complex. More than 100 command-line options lend expressiveness to networking gurus, but can confound novices. Some of its options have never even been documented. This book documents all Nmap features and, more importantly, teaches the most effective ways of using them. It has taken nearly four years to write, with constant updating as Nmap has evolved.

This book is dedicated to the Nmap community of users and developers. Your passion, ideas, patches, feature requests, flame wars, bug reports, and midnight rants have shaped Nmap into what it is today.

—Gordon “Fyodor” Lyon <fyodor@insecure.org>



[1] Based on having the highest download frequency, number of Google hits, and Freshmeat.Net software “popularity” ranking.


Prev   Next
Nmap Network Scanning (PRE-RELEASE BETA VERSION) Home Intended Audience and Organization
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]