Join Malcolm Shore for an in-depth discussion in this video Scanning in Windows with Zenmap, part of Cybersecurity for IT Professionals.
I'll now look at the graphical version of Nmap called Zenmap which comes as part of…the Windows and Map installation.…While Zenmap provides a graphical interface, it still creates and…displays the same command line that I've been using in Nmap.…At the top left, the Target is the specification of the host or…subnet to investigate.…So let's make our target N.1.1.0/26.…I don't want to do an intense scan, so…let's select a ping scan from the profile drop down.…
And we can see how end map has created the command line end map minus sn…10.1.1.0/26 in the same way as we would have typed it in at the command line.…Okay, let's go ahead and scan.…We can see in the left hand panel the list of hosts that have been detected.…And the standard scan output in the right hand panel.…The host details tab displays information on whichever the detected hosts we…select and allows notes to be added to the host record.…Let's select 10.1.1.51 and add a brief note that this is a Raspberry Pi.…
The scans tab provides a record of the scans that have been run this session.…
Author
Released
8/26/2014- Hackers and the kill chain
- Viruses, spyware, and adware
- Scanning with Windows Defender
- Building firewalls
- Scanning with Nmap
- Monitoring network communications with Netcat
- Combating application-level threats
- Capturing intruders through packet inspection
Skill Level Beginner
Duration
Views
Related Courses
-
Introduction
-
Welcome58s
-
-
1. Why Cybersecurity?
-
Hackers and the kill chain5m 46s
-
The Stuxnet kill chain3m 38s
-
-
2. Antivirus
-
Viruses, spyware, and adware1m 37s
-
Using Windows Defender1m 30s
-
-
3. Personal Firewalls
-
Why firewalls?38s
-
Setting up detailed rules3m 18s
-
-
4. Knowing What Is on Your Network
-
Scanning for hosts2m 31s
-
Scanning for services2m 2s
-
5. Network Communications and Detecting Intruders
-
Connecting to services2m 35s
-
6. Checking Hosts for Known Vulnerabilities
-
Getting started with Nessus1m 38s
-
Configuring Nessus2m 24s
-
Running a Nessus scan4m 43s
-
Scheduling a Nessus scan1m 54s
-
7. Checking for Common Mistakes in Web Apps
-
Web security scanning5m 32s
-
8. Monitoring Network Activity
-
Conclusion
-
Summary1m 21s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Scanning in Windows with Zenmap