Nmap is a command line network detection tool. It is the most commonly used security scanning tool in Linux, classic. This feature supports ping scanning to determine the online host, port scanning technology, and TCP/IP remote device fingerprint recognition. The latest available version is NMAP 4.46.1 and has been released recently.
Recommended reading:
Port scanning tool nmap in Linux
Nmap-network scanning and sniffing Toolkit
Nmap application skills
A tortuous installation of nmap in RedHat Enterprise Linux 5
Hide and seek nmap commands and firewalls in Linux
Download, install, and configure Ubuntu 14.04
Ubuntu 14.04 system:
Ubuntu 14.04 text tutorial on hard drive installation in Windows 7
Install Ubuntu 14.04 LTS official version on a USB flash drive
In Ubuntu 14.04, PPA is available and supports almost all Ubuntu and derivative versions. Open the terminal and run the following command:
sudo add-apt-repository ppa:pi-rho/security
sudo apt-get update
sudo apt-get install nmap
Run the following command to uninstall nmap:
sudo apt-get remove nmap
Remove PPA command:
sudo apt-get install ppa-purge
sudo ppa-purge ppa:pi-rho/security
Nmap basic commands and typical usage
Comprehensive Attack Scanning (including various host discovery, port scanning, version scanning, OS scanning, and default script scanning ):
Nmap-A-v targetip
Ping scan:
Nmap-sn-v targetip
Quick Port Scan:
Nmap-F-v targetip
Version scan:
Nmap-sV-v targetip
Operating system scan:
Nmap-O-v targetip
For example:
Bkjia @ ubuntu :~ $ Nmap-sP 192.168.211.1/255
Starting Nmap 6.46 (http://nmap.org) at PDT
Illegal netmask in "192.168.211.1/255". Assuming/32 (one host)
Note: Host seems down. If it is really up, but blocking our ping probes, try-Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.01 seconds
Bkjia @ ubuntu :~ $