3 Best Steps To Install and Use NMAP on Linux

In this article, we want to teach you How To Install and Use NMAP on Linux. NMAP (Network Mapper) is a security scanning tool used by testers (penetration testers/ethical hackers). It is a command-line tool based on a Linux environment used to discover and audit networks and scan and check vulnerabilities in IP addresses and ports for a given network.

With the NMAP tool what can we do:

  1. Network administrators can identify all devices that are running and accessing their systems.
  2. An administrator can identify all the hosts, and computers connected to their network, including the services that they offer.
  3. They can scan all the open ports, giving security a priority, that is, security threat detections.
  4. Also, they can scan or monitor a single host or thousands of devices connected.

You can now proceed to the following steps provided by the Orcacore team to Install and Use NMAP on Linux.

Easy Steps To Install and Use NMAP on Linux

To install and use NMAP on Linux, you need to log in to your server as a non-root user with sudo privileges.

In this guide, you will learn to Install and Use NMAP on Linux distributions such as Debian / Ubuntu / Centos and RHEL.

The installation of NMAP is so easy. With a single command, you can Install and Use NMAP on Linux. Let’s see how we can do it.

Step 1 – Install NMAP on Debian / Ubuntu

To install NMAP on the Debian / Ubuntu Linux distribution, you can easily run the following command:

sudo apt-get install nmap -y
Or
sudo apt install nmap -y

Tips: To explore the differences between apt and apt-get, you can check this guide on apt vs apt-get – Which One Should We Use.

After your installation is finished, you can verify that you have installed NMAP correctly by checking its version:

nmap –version

In your output you will see something similar to this:

Output
Nmap version 7.80 ( https://nmap.org )
Platform: x86_64-pc-linux-gnu
Compiled with: liblua-5.3.3 openssl-1.1.1d nmap-libssh2-1.8.2 libz-1.2.11 libpcre-8.39 libpcap-1.9.1 nmap-libdnet-1.12 ipv6
Compiled without:
Available nsock engines: epoll poll select

Step 2 – Install NMAP on Centos / RHEL / AlmaLinux / Rocky Linux

To install NMAP on Centos and RHEL-based Linux distributions such as AlmaLinux and Rocky Linux, you can use the following command:

sudo yum install nmap -y
Or
sudo dnf install nmap -y

Tips: Also, you can check this guide on Differences between YUM and DNF package managers.

Then, verify that you have installed NMAP correctly by checking its version:

nmap -version

Your output should be similar to this:

Output
Nmap version 6.40 ( http://nmap.org )
Platform: x86_64-redhat-linux-gnu
Compiled with: nmap-liblua-5.2.2 openssl-1.0.2k libpcre-8.32 libpcap-1.5.3 nmap-libdnet-1.12 ipv6
Compiled without:
Available nsock engines: epoll poll select

After you finish the installation, let’s see how to use NMAP on Linux.

Step 3 – Use the NMAP Tool on Linux

When you have completed the installation process, Nmap commands are similar regardless of the Linux distribution.

Nmap provides a list of scanned targets along with supplemental information, based on the options and arguments used.

Note: Remember that port scanning to find open ports without permissions can be interpreted as malicious by third-party organizations.

Scan IP range or subnet with Nmap

You can get general information about a remote system with the following command:

sudo nmap target_IP or domain.com

Also, you can use Nmap to scan a whole IP range by defining it in your command line instead of scanning individual IPs:

sudo nmap 192.168.1.5-200

You can scan the entire specified subnet with the following command:

sudo nmap 192.168.1.0/24

By default, Nmap scans the thousand most common ports for each protocol. It also offers options for specifying which ports are to be scanned.

The -p option allows you to specify port ranges:

sudo nmap –p 80,443 192.168.1.200

This command scans ports 80 and 443 for the defined host.

Port Scanning with Nmap

At this step of Install and Use NMAP on Linux, you will learn Port scanning. Nmap is a port scanner that recognizes six port states:

  1. open: Actively accepting TCP connections, UDP datagrams, or SCTP associations.
  2. closed: Accessible; however, no application is listening on the port.
  3. filtered: Nmap cannot determine whether the port is open due to packet filtering.
  4. unfiltered: The port is accessible; however, Nmap is unable to determine if it is open or closed.
  5. open|filtered: Nmap cannot determine if a port is open or filtered.
  6. closed|filtered: Nmap cannot establish if a port is closed or filtered.

TCP SYN scan with Nmap

TCP SYN is a fast and simple scan. Because this type of scan never completes TCP connections, it is often referred to as half-open scanning.

You can use the following command to run a TCP SYN scan:

sudo nmap -sS 192.168.1.200

Explore Nmap options

At this step of Install and Use NMAP on Linux, you can explore the NMAP options.

Nmap has an option to define the speed and thoroughness of the scan. Scan speeds start at T0 and span to T5.

The –v option increases verbosity and forces Nmap to print more information about the scan in progress.

The -A option enables a comprehensive set of scan options:

  1. OS detection, you can use the -O option for this instead.
  2. version scanning, also available in the -sV option.
  3. script scanning, also available with the -sC option.
  4. traceroute, also available with the –traceroute option.

You can combine the options listed to detect the OS and version, script scanning, and traceroute. You can also use –A and –T4 for faster execution. Additionally, the –Pn option to tell the Nmap tool not to initiate a ping scan:

sudo nmap –A –T4 –v –Pn orcacore.com

For more details and more options, you can use the following man command:

man nmap

Or you can access the NMAP page to get more information.

Conclusion

At this point, you have learned to Install and Use NMAP on Linux. Also, you have learned about the concepts and usage of Nmap along with its most commonly used commands to perform port scans.

Hope you enjoy this section of the Security Tutorials. Also, you may like to read the following articles:

Secure Alpine Linux Using CSF Firewall

Secure Ubuntu 24.04 with AppArmor

Top SSH Security Tips on AlmaLinux 9

FAQs

What is Nmap?

Nmap (Network Mapper) is a security scanning tool used to discover, audit, and check vulnerabilities in networks. You can easily follow the guide steps above to Install and Use NMAP on Linux.

How do I install Nmap on Linux?

As described in the above guide on Install and Use Nmap on Linux, you can use the following commands:
Debian/Ubuntu: sudo apt-get install nmap
CentOS/RHEL: sudo yum install nmap

How do I perform a basic network scan with Nmap?

Easily you can use the command below:
sudo nmap target_IP

Newsletter Updates

Enter your email address below and subscribe to our newsletter

Leave a Reply

Stay informed and not overwhelmed, subscribe now!