Generated by GPT-5-mini| Nmap | |
|---|---|
![]() | |
| Name | Nmap |
| Developer | Fyodor, Gordon Lyon; Google, Microsoft (users), Red Hat, Debian |
| Initial release | 1997 |
| Programming language | C, C++ |
| Operating system | Linux, Microsoft Windows, macOS, FreeBSD, NetBSD |
| License | GNU General Public License |
| Website | Nmap |
Nmap Nmap is a network scanning and host-discovery tool originally authored by Fyodor (Gordon Lyon) that is widely used by system administrators, cybersecurity researchers, and incident responders. It automates tasks such as port enumeration, service fingerprinting, and operating system detection across networks that involve devices from vendors like Cisco Systems and Juniper Networks, and it integrates with platforms such as Kali Linux, BackTrack, and Ubuntu. Nmap has influenced software projects and standards involving OpenVAS, Metasploit Framework, Wireshark, Snort, and compliance frameworks employed by organizations including PCI DSS, NIST, and SANS Institute.
Nmap originated in 1997 as a response to the need for reliable port scanning on the Internet and has been maintained and extended by contributors associated with projects at institutions like University of Michigan and companies such as Nmap Project contributors and volunteers. The tool’s ecosystem includes a graphical front end, a scripting language, and a suite of utilities used by practitioners at firms like CrowdStrike, FireEye, and Cisco Talos. Nmap’s development history intersects with events and groups such as the DEF CON and Black Hat communities, and its distribution is facilitated through package maintainers for Fedora Project, Arch Linux, and Debian.
Nmap implements features used in operations by agencies and vendors including US-CERT, CERT/CC, and product teams at IBM Security and Microsoft Defender. Capabilities include TCP and UDP port scanning, service version detection, host discovery, OS fingerprinting, timing and performance controls, and scripting via the Nmap Scripting Engine (NSE). These capabilities support workflows in penetration testing practiced by researchers affiliated with Rapid7, Qualys, and Tenable, Inc. and complement analysis performed in environments like Amazon Web Services, Microsoft Azure, and Google Cloud Platform.
Common command-line usage mirrors conventions found in utilities from projects such as GNU Project and BusyBox, and administrators often invoke Nmap on systems managed by teams at Red Hat, SUSE, or Canonical. Syntax allows specification of target hosts or ranges (CIDR notation used by IANA allocations), port ranges, timing templates, and output options. Operators integrate Nmap into automation with orchestration systems like Ansible, SaltStack, and Puppet and into continuous integration pipelines used by organizations following practices from DevOps pioneers such as teams at Netflix and Dropbox.
Nmap supports scanning techniques that were compared in academic evaluations at institutions like MIT, Stanford University, and Carnegie Mellon University, and employed by teams in vulnerability research at Google Project Zero and Microsoft Security Response Center. Available probes include TCP SYN scan, TCP connect scan, UDP scan, SCTP INIT scan, ACK scan, FIN scan, NULL scan, and NULL/FIN/XMAS combinations. Advanced options include idle scanning (using characteristics studied in CERT Coordination Center advisories), IP protocol scanning, fragment packet handling, decoys, and timing templates; practitioners reference threat models from agencies such as ENISA and standards from IETF when selecting techniques.
Nmap produces multiple output formats adopted by integrations used in products from Splunk, Elastic, and Graylog. Formats include human-readable interactive output, XML suitable for SOAP-style integrations, machine-parsable grepable output, and a binary format used by companion tools. Parsers and libraries that consume Nmap output are developed in ecosystems involving languages and projects like Python (programming language), Ruby (programming language), Go (programming language), and Perl, and are used in toolchains by companies such as Rapid7 and Tenable for reporting and remediation workflows.
Nmap’s source code is managed in version control systems and mirrors influenced by practices at GitHub, GitLab, and the GNU Project; contributions come from independent researchers and corporate engineers. Nmap is distributed under the GNU General Public License; compatibility and redistribution have been discussed in contexts involving the Free Software Foundation and legal issues similar to those considered in litigation around OpenSSL and other open-source projects. Security considerations include responsible disclosure coordinated with organizations like CERT/CC, MITRE (including CVE assignments), and vendor response teams at Microsoft and Cisco when scan behavior interacts with intrusion detection or firewall products.
Nmap has been used in incident response and research cited by publications from SANS Institute, USENIX, and academic conferences such as ACM CCS and IEEE S&P; it appears in toolsets curated by law enforcement and CERT teams including FBI cyber investigations and national CERTs in United Kingdom, Australia, and Canada. Criticism has arisen from vendors and administrators at enterprises like AT&T and Verizon regarding scan impact on production networks, and from privacy advocates affiliated with organizations such as Electronic Frontier Foundation about potential abuse. Debates over scanning ethics and policy reference international law topics covered in forums like ICANN and standards discussions at IETF.
Category:Network administration software