Nmap
Comandos Nmap
Comandos completos de Nmap y flujos de trabajo para el descubrimiento de redes y auditoría de seguridad en todas las plataformas.
Instalación¶
Linux/Ubuntu¶
# Package manager installation
sudo apt update && sudo apt install nmap
# Alternative: Download from official source
wget https://releases.nmap.com/latest/nmap-linux.tar.gz
tar -xzf nmap-linux.tar.gz
sudo mv nmap /usr/local/bin/
# Kali Linux
sudo apt install nmap
macOS¶
# Using Homebrew
brew install nmap
# Using MacPorts
sudo port install nmap
# Manual installation
curl -O https://releases.nmap.com/latest/nmap-macos.pkg
sudo installer -pkg nmap-macos.pkg -target /
Windows¶
# Using Chocolatey
choco install nmap
# Using Scoop
scoop install nmap
# Using winget
winget install nmap
# Manual download from official website
# Visit https://nmap.com/download
Comandos básicos¶
| Command | Description |
|---|---|
| INLINE_CODE_5 | Show help information |
| INLINE_CODE_6 | Display version information |
| INLINE_CODE_7 | Basic scan of target |
| INLINE_CODE_8 | Verbose scan of target |
| INLINE_CODE_9 | Save output to file |
| INLINE_CODE_10 | Read input from file |
| INLINE_CODE_11 | Specify port number |
| INLINE_CODE_12 | Set timeout value |
Comandos Avanzados¶
| Command | Description |
|---|---|
| INLINE_CODE_13 | Aggressive scan mode |
| INLINE_CODE_14 | Stealth SYN scan |
| INLINE_CODE_15 | UDP scan |
| INLINE_CODE_16 | OS detection |
| INLINE_CODE_17 | Version detection |
| INLINE_CODE_18 | Run NSE scripts |
| INLINE_CODE_19 | Timing template |
| INLINE_CODE_20 | Fragment packets |
Configuración¶
| Command | Description |
|---|---|
| INLINE_CODE_21 | Show current configuration |
| INLINE_CODE_22 | Set configuration value |
| INLINE_CODE_23 | Get configuration value |
| INLINE_CODE_24 | Remove configuration value |
| INLINE_CODE_25 | Set global configuration |
Common Use Cases¶
Red Scanning¶
# Basic port scan
nmap -p 1-1000 192.168.1.1
# Service version detection
nmap -sV -p 22,80,443 target.com
# OS fingerprinting
nmap -O target.com
Vulnerability Assessment¶
# Script scan for vulnerabilities
nmap --script vuln target.com
# Comprehensive scan
nmap -A -T4 target.com
# Save results to file
nmap -oA scan_results target.com
Troubleshooting¶
| Issue | Solution |
|---|---|
| Command not found | Ensure nmap is installed and in PATH |
| Permission denied | Use INLINE_CODE_26 or check file permissions |
| Connection timeout | Check network connectivity and firewall |
| Invalid syntax | Verify command syntax and parameters |
| Version conflicts | Update to latest version or check compatibility |
Consejos y trucos¶
- Usar
nmap --helppara la ayuda específica del comando - Compruebe
nmap --version_ para verificar la instalación - Usar la ficha de terminación para una entrada de comando más rápida
- Crear alias para comandos usados con frecuencia
- Mantenga nmap actualizado a la última versión
Herramientas relacionadas¶
- Nmap - Búsqueda de redes y auditoría de seguridad
- [Metasploit] (metasploit.md) - Marco de pruebas de penetración
- Burp Suite - Pruebas de seguridad de aplicaciones web
- Wireshark - Analizador de protocolo de red
Resources¶
- [Documentación Oficial](URL_35__
- [Repositorio GitHub](URL_36__
- [Foro de la Comunidad](URL_37___
- [Desbordamiento de los muelles](URL_38_
-...
*Última actualización: 2025-07-05 sometida[editar en GitHub](URL_39_