Maxaad Baranaysaa Casharkaan?

Nmap (Network Mapper) waa tool-ka ugu caansan ee port scanning-ka. Waxaa abuurtay Gordon Lyon ("Fyodor") 1997. Waxaa isticmaala dhammaan xirfadlayaasha cybersecurity adduunka. Casharkaan wuxuu kugu barin doonaa sida loo isticmaalo Nmap si xirfad leh.

📌 Waxaad baranaysaa: Nmap waa maxay, noocyada scan-ka, output-ka faahfaahsan, OS detection, service version, iyo NSE scripts.

⚖️ Ogeysiis Muhiim ah: Nmap HU ISTICMAALI nidaamka aad fasax u leedahay oo keliya! Localhost (127.0.0.1) ama nidaam test-ka ku habboon (sida VulnHub/HackTheBox VMs). Scanning nidaamka kale fasax la'aanteed waa dembi sharci ah dalal badan.

1. Nmap Rakib

# Kali Linux (horay loo rakibay)
nmap --version

# Ubuntu/Debian
sudo apt update && sudo apt install nmap

# macOS
brew install nmap

# Windows
# Ka soo dajiso nmap.org/download.html

# Xaqiijiso
nmap --version
# Nmap version 7.94 ...

2. Scan-ka Aasaasiga ah

# Scan host gaar ah
nmap 192.168.1.1

# Scan domain
nmap scanme.nmap.org    # (Site testa oo Nmap siiyeen si sharci ah)

# Scan range shabakadeed
nmap 192.168.1.0/24     # Scan dhammaan nidaamyada 192.168.1.1-254
nmap 192.168.1.1-20     # Scan 192.168.1.1 ilaa .20

# Hubi hadduu host socdo (ping scan)
nmap -sn 192.168.1.0/24

3. Noocyada Scan-ka Muhiimka ah

Nooca ScanFlagSharaxaad
TCP SYN (Default)-sSScan-ka ugu caansan — "half open" — dhakhso badan, yar in la ogaado
TCP Connect-sTFull TCP handshake — aad bay u caddahay, laakiin fasax admin ma baahna
UDP Scan-sUScan-ka UDP ports — gaabis laakiin muhiim
Ping Scan-snKaliya hubi hadduu host socdo — ma scanneyso ports
Version Detection-sVHel nooca software-ka adeegga
OS Detection-OFiiri OS-ka nidaamka (root/admin u baahan)
Aggressive-ADhammaan: OS, version, scripts, traceroute

4. Scan-yada Xirfadlaha

# Version detection — software-ka ogaanshaha
nmap -sV 192.168.1.1

# OS detection (root u baahan)
sudo nmap -O 192.168.1.1

# Aggressive scan (dhammaan macluumaadka)
sudo nmap -A 192.168.1.1

# Scan ports gaar ah
nmap -p 80,443,22,21 192.168.1.1

# Scan dhammaan 65535 ports
nmap -p- 192.168.1.1

# Scan ports ugu caansan 1000
nmap --top-ports 1000 192.168.1.1

# Qareen (stealth) scan — dhakhso yar
sudo nmap -sS -T2 192.168.1.1

# Dhakhso badan
nmap -T4 192.168.1.1

# Keydi natiijada faylo
nmap -oN natiijo.txt 192.168.1.1       # Normal
nmap -oX natiijo.xml 192.168.1.1       # XML
nmap -oG natiijo.grep 192.168.1.1      # Grepable

5. Turjumida Natiijada

# Tusaale natiijo:
nmap -sV scanme.nmap.org

# Starting Nmap 7.94 ...
# Nmap scan report for scanme.nmap.org (45.33.32.156)
# Host is up (0.15s latency).
# Not shown: 995 closed tcp ports (reset)
#
# PORT    STATE    SERVICE   VERSION
# 22/tcp  open     ssh       OpenSSH 6.6.1p1
# 25/tcp  filtered smtp
# 80/tcp  open     http      Apache httpd 2.4.7
# 9929/tcp open    nping-echo Nping echo
#
# Nmap done: 1 IP address (1 host up) scanned in 12.34 seconds

# Macnaha:
# open     = Port furan — adeeg wuu shaqaynayaa
# closed   = Port xidhan — ma jiro adeeg
# filtered = Firewall ayaa xidaya — ma garan karno
# SERVICE  = Nooca adeegga
# VERSION  = Nooca software-ka

6. NSE Scripts — Nmap Scripting Engine

NSE (Nmap Scripting Engine) waxay kugu oggolaanaysaa inaad ku darto functionalities dheeraad ah scan-kaaga.

# Liiska scripts-ka
ls /usr/share/nmap/scripts/ | head -20

# Isticmaal script gaar ah
nmap --script http-title 192.168.1.1           # Hel HTML title
nmap --script http-auth 192.168.1.1            # HTTP authentication
nmap --script ssh-brute 192.168.1.1            # SSH brute force (LAA ISTICMAALIN si xun!)

# Checks nuglaanshaha SMB
nmap --script smb-vuln-ms17-010 192.168.1.1   # EternalBlue (WannaCry)

# Scan vuln dhammaan
nmap --script vuln 192.168.1.1                 # Dhammaan vulnerability scripts

# Hel xogta HTTP server
nmap --script http-headers 192.168.1.1
nmap --script http-methods 192.168.1.1

7. Practice: Scan Localhost

# Scan naftiisa (localhost — si ammaan ah)
nmap localhost
nmap 127.0.0.1

# Ku dar version detection
nmap -sV localhost

# Aad ugu faahfaahsan
sudo nmap -A localhost

# Fiiri ports-ka adoo isticmaalaya ss
ss -tulnp

# Laba bar: Nmap vs ss — is barbardhig
# Nmap wuxuu ka shaqeeyaa dibadda (scanner)
# ss wuxuu ka shaqeeyaa gudaha nidaamka

🎉 Hambalyo! Waxaad dhammaystirtay Casharka 5aad — Nmap! Hadda waxaad kari kartaa inaad baarto nidaamyada si xirfad leh. Casharka xiga — casharka ugu dambeeya — waxaad baranaysaa Web Security: XSS, SQL Injection, iyo directory discovery.