Add verbosity with nmap -v -A 192.168.1.1
In this step, we will add verbosity to our Nmap aggressive scan. Verbosity in Nmap means increasing the amount of information displayed during the scan. This can be helpful for understanding what Nmap is doing and for troubleshooting any issues. The -v
option increases the verbosity level. Using -v
multiple times (e.g., -vv
or -vvv
) increases the verbosity level further, providing even more detailed output.
Let's clarify why verbosity is useful. By default, Nmap provides a summary of the scan results. However, when troubleshooting or trying to understand the scan process, more detailed information can be invaluable. Verbose output shows the progress of the scan, the probes being sent, and the responses received.
Now, let's execute the Nmap command with verbosity. Open your Xfce terminal. Ensure you are in the ~/project
directory.
cd ~/project
Then, run the following Nmap command:
sudo nmap -v -A 192.168.1.1
You will be prompted for your password. Since the labex
user has sudo
privileges without a password, just press Enter
.
This command will initiate an aggressive scan against the target IP address 192.168.1.1
, with increased verbosity. Nmap will display more information about the scan process as it progresses.
The output will be more detailed than the previous aggressive scan. You will see information about the probes being sent, the responses received, and the progress of each stage of the scan. Here's an example of what the output might look like (though your results will likely differ):
Starting Nmap 7.80 ( https://nmap.org )
NSE: Loaded 151 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 3) scan.
NSE: Executing script msrpc-enum on 192.168.1.1
NSE: Starting runlevel 2 (of 3) scan.
NSE: Starting runlevel 3 (of 3) scan.
NSE: Finished script pre-scanning.
Initiating Ping Scan at 14:35
Scanning 192.168.1.1 [4 ports]
Completed Ping Scan at 14:35, 0.00s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 14:35
Completed Parallel DNS resolution of 1 host. at 14:35, 0.00s elapsed
Initiating SYN Stealth Scan at 14:35
Scanning 192.168.1.1 [1000 ports]
Discovered open port 22/tcp on 192.168.1.1
Discovered open port 80/tcp on 192.168.1.1
Discovered open port 443/tcp on 192.168.1.1
Completed SYN Stealth Scan at 14:35, 0.15s elapsed (1000 total ports)
Initiating Service scan at 14:35
Scanning 3 services on 192.168.1.1
Completed Service scan at 14:35, 5.23s elapsed (3 services total)
Initiating OS detection at 14:35
Completed OS detection at 14:35, 5.18s elapsed
Nmap scan report for 192.168.1.1
Host is up (0.00078s latency).
Not shown: 997 closed ports
... (rest of the output) ...
The verbose output shows the different stages of the scan, such as the ping scan, port scanning, service detection, and OS detection. It also shows the scripts being executed by the Nmap Scripting Engine (NSE).