title
Nmap Tutorial For Beginners | How to Scan Your Network Using Nmap | Ethical Hacking Tool | Edureka
description
🔵 Edureka Cyber Security Masters Program: https://bit.ly/3pfHHIN
This Edureka "Nmap Tutorial" video will give you an expansive view into Ethical Hacking. This video will give you a working demonstration of nmap for scanning a particular network for reconnaissance purposes. Below are the list of topics along with their timestamps:
0:15 What is Nmap?
1:09 Installation
1:50 IP Scans
3:38 Scanning Multiple Hosts
6:30 Scanning from input file
8:02 Port Scanning
10:00 Agressive Scanning
11:20 Version Detection
11:51 OS Detection
12:33 Packet Route Discovery
13:35 Writing Results to a LOG File
14:49 Verbose Scans
🔥CompTIA Security+ Certification Training: https://bit.ly/3nxeVRl
🔥Certified Ethical Hacking Course - CEH v12 Training : https://www.edureka.co/ceh-ethical-hacking-certification-course
#edureka #nmaptutorial #ethicalhacker #cybersecurity #ethicalhacking
Do subscribe to our channel and hit the bell icon to never miss an update from us in the future: https://goo.gl/6ohpTV
Instagram: https://www.instagram.com/edureka_learning
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
For more information, Please write back to us at sales@edureka.co or call us at IND: 9606058406 / US: 18338555775 (toll-free).
detail
{'title': 'Nmap Tutorial For Beginners | How to Scan Your Network Using Nmap | Ethical Hacking Tool | Edureka', 'heatmap': [{'end': 155.606, 'start': 114.544, 'weight': 0.802}, {'end': 407.732, 'start': 396.917, 'weight': 0.765}], 'summary': 'This tutorial introduces nmap, a network scanner for ethical hackers, demonstrating its capabilities through a dns scan on www.edureka.co completing in 13.71 seconds. it covers nmap port scanning techniques, including various scan types and their impact on scan speed with illustrative examples. additionally, it discusses the usage of traceroute command, saving nmap scan results, and the importance of network scans in security analysis.', 'chapters': [{'end': 159.169, 'segs': [{'end': 75.252, 'src': 'embed', 'start': 31.397, 'weight': 0, 'content': [{'end': 43.347, 'text': 'so suppose you have a wi-fi that has been set up in your new house and you realize that your data is being actually consumed at a faster rate than you are using it now.', 'start': 31.397, 'duration': 11.95}, {'end': 49.092, 'text': "you have suspected that it's your pesky neighbor who keeps on connecting to your wi-fi and eating up all your data.", 'start': 43.347, 'duration': 5.745}, {'end': 56.418, 'text': 'so, to actually confirm all your doubts, what you want to do is a network scan, and nmap is a pretty wonderful tool to do that.', 'start': 49.092, 'duration': 7.326}, {'end': 64.444, 'text': "Now Nmap runs on Linux, Mac OS and Windows, and I'm mostly going to be running this on Linux,", 'start': 56.818, 'duration': 7.626}, {'end': 69.067, 'text': "because that's what I do most of my penetration testing and network testing on.", 'start': 64.444, 'duration': 4.623}, {'end': 75.252, 'text': "So let's go ahead and get on with the installation of Nmap on your computer.", 'start': 69.748, 'duration': 5.504}], 'summary': 'Using nmap for network scan to detect data consumption by neighbor on wi-fi.', 'duration': 43.855, 'max_score': 31.397, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/IoIsTrKrl-0/pics/IoIsTrKrl-031397.jpg'}, {'end': 159.169, 'src': 'heatmap', 'start': 114.544, 'weight': 1, 'content': [{'end': 121.466, 'text': 'So if you just go into nmap and type dash dash help this will give you all the flags and options that are available to actually use on nmap.', 'start': 114.544, 'duration': 6.922}, {'end': 129.389, 'text': "So if you are actually stuck and you can't remember stuff, just go in and type nmam-help and it will give you all the stuff.", 'start': 122.626, 'duration': 6.763}, {'end': 135.333, 'text': "Now, network scans generally take a long time, so I'm going to be using the fast mode most of the time.", 'start': 129.75, 'duration': 5.583}, {'end': 141.897, 'text': 'So for fast mode, all you have to do is type in edureka.co and sit and wait for this scan to get over.', 'start': 135.714, 'duration': 6.183}, {'end': 146.24, 'text': 'Now, when the scan gets over, you will see a bunch of information.', 'start': 142.197, 'duration': 4.043}, {'end': 151.523, 'text': "And let me just wait till that information pops up and then we'll talk about the information together.", 'start': 146.84, 'duration': 4.683}, {'end': 155.606, 'text': 'okay. so, as you guys can see, our scan has been completed.', 'start': 151.963, 'duration': 3.643}, {'end': 159.169, 'text': 'it took 13.71 seconds to actually do the scan.', 'start': 155.606, 'duration': 3.563}], 'summary': 'Using nmap for network scans in fast mode took 13.71 seconds.', 'duration': 23.455, 'max_score': 114.544, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/IoIsTrKrl-0/pics/IoIsTrKrl-0114544.jpg'}], 'start': 11.138, 'title': 'Nmap tutorial: network scanning basics', 'summary': 'Introduces nmap, a network scanner used by ethical hackers, highlighting its capabilities to detect unauthorized access and its compatibility with various operating systems. it demonstrates a dns scan on www.edureka.co, completing in 13.71 seconds.', 'chapters': [{'end': 159.169, 'start': 11.138, 'title': 'Nmap tutorial: network scanning basics', 'summary': 'Introduces nmap as a network scanner used by ethical hackers, highlighting its capabilities to detect unauthorized access and its compatibility with various operating systems. demonstrating a dns scan on www.edureka.co, a scan completes in 13.71 seconds.', 'duration': 148.031, 'highlights': ['Nmap is a network scanner used by ethical hackers to detect unauthorized access and runs on Linux, Mac OS, and Windows.', 'Demonstrates a DNS scan on www.edureka.co, completing in 13.71 seconds.', 'Explains the need for a network scanner using the example of suspected unauthorized access to Wi-Fi by a neighbor.']}], 'duration': 148.031, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/IoIsTrKrl-0/pics/IoIsTrKrl-011138.jpg', 'highlights': ['Nmap is a network scanner used by ethical hackers to detect unauthorized access and runs on Linux, Mac OS, and Windows.', 'Demonstrates a DNS scan on www.edureka.co, completing in 13.71 seconds.', 'Explains the need for a network scanner using the example of suspected unauthorized access to Wi-Fi by a neighbor.']}, {'end': 745.737, 'segs': [{'end': 185.191, 'src': 'embed', 'start': 159.169, 'weight': 0, 'content': [{'end': 163.933, 'text': 'now, as you guys can see, it shows us the ports, the states and the services.', 'start': 159.169, 'duration': 4.764}, {'end': 169.758, 'text': 'now the ports is basically the port number which our service, that is also binder 2, is working on.', 'start': 163.933, 'duration': 5.825}, {'end': 181.448, 'text': 'so we can see that ssh service is working on port number 22, SMTP on 25, HTTP on 80, RPC bind on 111 and HTTPS on 443..', 'start': 169.758, 'duration': 11.69}, {'end': 185.191, 'text': 'So that is how you can use Nmap to scan a certain website.', 'start': 181.448, 'duration': 3.743}], 'summary': 'Nmap displays ports, states, and services for a website; e.g., ssh on port 22, smtp on 25, http on 80, rpc bind on 111, and https on 443.', 'duration': 26.022, 'max_score': 159.169, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/IoIsTrKrl-0/pics/IoIsTrKrl-0159169.jpg'}, {'end': 234.868, 'src': 'embed', 'start': 211.423, 'weight': 1, 'content': [{'end': 218.17, 'text': 'Okay so as you guys can see that our command also works when we put in the IP address and it produces the same results.', 'start': 211.423, 'duration': 6.747}, {'end': 222.755, 'text': 'Now we can also scan for multiple hosts.', 'start': 218.551, 'duration': 4.204}, {'end': 227.76, 'text': 'Now suppose you are on a network and you want to scan for multiple hosts.', 'start': 223.396, 'duration': 4.364}, {'end': 230.143, 'text': "Now you don't really want to run different commands for that.", 'start': 227.82, 'duration': 2.323}, {'end': 232.826, 'text': 'Now what you can do is just go in and type nmap.', 'start': 230.383, 'duration': 2.443}, {'end': 234.868, 'text': 'And a bunch of IP addresses like 192.168.', 'start': 233.306, 'duration': 1.562}], 'summary': "The command 'nmap' works for scanning multiple hosts using ip addresses like 192.168.", 'duration': 23.445, 'max_score': 211.423, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/IoIsTrKrl-0/pics/IoIsTrKrl-0211423.jpg'}, {'end': 286.945, 'src': 'embed', 'start': 262.687, 'weight': 2, 'content': [{'end': 269.832, 'text': 'So that will tell you and give you a constant update on how your scan is going like mine is 32.4% done and 34.7% now and also show you kind of the time remaining.', 'start': 262.687, 'duration': 7.145}, {'end': 277.738, 'text': 'Okay, so till this port scan is going on, let me just tell you about the states.', 'start': 273.755, 'duration': 3.983}, {'end': 281.681, 'text': 'Now, states can be of two types, open, closed, and unavailable.', 'start': 277.858, 'duration': 3.823}, {'end': 286.945, 'text': "Sometimes you'll see that it is unavailable, and that's because some sort of firewall or something is running on there.", 'start': 281.761, 'duration': 5.184}], 'summary': "Transcript explains progress of a scan, types of states and reasons for 'unavailable' state.", 'duration': 24.258, 'max_score': 262.687, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/IoIsTrKrl-0/pics/IoIsTrKrl-0262687.jpg'}, {'end': 329.908, 'src': 'embed', 'start': 301.816, 'weight': 6, 'content': [{'end': 305.517, 'text': 'So our scan has done 81% and takes around another 20 seconds.', 'start': 301.816, 'duration': 3.701}, {'end': 306.637, 'text': 'It should be done soon.', 'start': 305.837, 'duration': 0.8}, {'end': 316.239, 'text': 'Now this scan could be significantly made faster with just the F tag, but I really want to give you all a good look into how this works.', 'start': 307.297, 'duration': 8.942}, {'end': 320.079, 'text': '97, 98, 98, 9..', 'start': 316.259, 'duration': 3.82}, {'end': 323.223, 'text': 'okay, so, as you guys can see, this is our result.', 'start': 320.08, 'duration': 3.143}, {'end': 326.125, 'text': 'it gives us a bunch of ports and services.', 'start': 323.223, 'duration': 2.902}, {'end': 329.908, 'text': 'now, as i just said, this thing can be also closed and also unavailable.', 'start': 326.125, 'duration': 3.783}], 'summary': 'Scan at 81% with 20 seconds remaining. results show ports and services, some closed or unavailable.', 'duration': 28.092, 'max_score': 301.816, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/IoIsTrKrl-0/pics/IoIsTrKrl-0301816.jpg'}, {'end': 385.13, 'src': 'embed', 'start': 356.632, 'weight': 4, 'content': [{'end': 361.036, 'text': 'So this is a very useful way of actually scanning multiple IP addresses.', 'start': 356.632, 'duration': 4.404}, {'end': 363.679, 'text': 'And let me just show you how that works.', 'start': 361.657, 'duration': 2.022}, {'end': 369.207, 'text': 'Since we have used the F flag, this is going to work considerably faster.', 'start': 365.106, 'duration': 4.101}, {'end': 375.248, 'text': 'Now, as you guys can see out here, this had taken around 119 seconds.', 'start': 369.687, 'duration': 5.561}, {'end': 376.668, 'text': "So that's around two minutes.", 'start': 375.268, 'duration': 1.4}, {'end': 379.749, 'text': 'Now this will take a considerably lesser time.', 'start': 377.388, 'duration': 2.361}, {'end': 385.13, 'text': "So let's see, this was done in 29.91 seconds and we did 30 IP addresses.", 'start': 380.249, 'duration': 4.881}], 'summary': 'Using the f flag for scanning multiple ip addresses reduced the time from 119 seconds to 29.91 seconds, covering 30 ip addresses.', 'duration': 28.498, 'max_score': 356.632, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/IoIsTrKrl-0/pics/IoIsTrKrl-0356632.jpg'}, {'end': 425.001, 'src': 'heatmap', 'start': 396.917, 'weight': 0.765, 'content': [{'end': 399.038, 'text': 'Let me just cat it out for you.', 'start': 396.917, 'duration': 2.121}, {'end': 401, 'text': "So, there's nothing in it.", 'start': 400.099, 'duration': 0.901}, {'end': 402.982, 'text': 'Now, all I want to do is edit this file.', 'start': 401.04, 'duration': 1.942}, {'end': 407.732, 'text': 'So, let me just edit that file and put in 192.168.', 'start': 403.703, 'duration': 4.029}, {'end': 411.669, 'text': '1.1 192.168.', 'start': 407.732, 'duration': 3.937}, {'end': 415.606, 'text': '1.2 192.168.', 'start': 411.669, 'duration': 3.937}, {'end': 417.845, 'text': '1.3 192.168.', 'start': 415.606, 'duration': 2.239}, {'end': 418.385, 'text': '1.4 192.168.', 'start': 417.845, 'duration': 0.54}, {'end': 425.001, 'text': '1.5 or 15 boom roasted.', 'start': 418.385, 'duration': 6.616}], 'summary': 'Editing a file and inputting 192.168 in multiple lines, followed by a humorous remark.', 'duration': 28.084, 'max_score': 396.917, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/IoIsTrKrl-0/pics/IoIsTrKrl-0396917.jpg'}, {'end': 640.817, 'src': 'embed', 'start': 611.934, 'weight': 5, 'content': [{'end': 617.398, 'text': 'So to do that, all you have to do is nmap-a and then you go edureka.co.', 'start': 611.934, 'duration': 5.464}, {'end': 621.942, 'text': 'So let us see how much time did this take to actually execute.', 'start': 618.599, 'duration': 3.343}, {'end': 624.284, 'text': 'This took 459 seconds.', 'start': 621.982, 'duration': 2.302}, {'end': 625.905, 'text': "That's a long time for a scan.", 'start': 624.344, 'duration': 1.561}, {'end': 629.668, 'text': 'But it gives us a bunch of other information.', 'start': 626.325, 'duration': 3.343}, {'end': 632.03, 'text': 'For example, it gives us the traceroute.', 'start': 629.948, 'duration': 2.082}, {'end': 640.817, 'text': 'So what is a traceroute, first of all? So traceroute is the route taken by a packet to actually reach the clients and the target server.', 'start': 632.35, 'duration': 8.467}], 'summary': 'Using nmap-a, the scan took 459 seconds, providing traceroute information.', 'duration': 28.883, 'max_score': 611.934, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/IoIsTrKrl-0/pics/IoIsTrKrl-0611934.jpg'}, {'end': 752.262, 'src': 'embed', 'start': 725.863, 'weight': 7, 'content': [{'end': 731.807, 'text': "and this scan together basically took me more than 10 minutes and I don't really have that kind of time for explaining all this stuff.", 'start': 725.863, 'duration': 5.944}, {'end': 738.352, 'text': 'So, as you guys can see out here, the OS is kind of, OS detail is Fortinet FortiGate.', 'start': 732.387, 'duration': 5.965}, {'end': 745.737, 'text': 'It kind of tries to guess the OS upon the time to live that is in the response from the packets that it sends.', 'start': 738.912, 'duration': 6.825}, {'end': 752.262, 'text': 'So, hyphen S, V, hyphen O, and hyphen A are some really cool stuff that you might want to know.', 'start': 746.318, 'duration': 5.944}], 'summary': 'Scanning took over 10 minutes, os detail: fortinet fortigate, uses ttl to guess os, mentions important options -s, -v, -o, -a.', 'duration': 26.399, 'max_score': 725.863, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/IoIsTrKrl-0/pics/IoIsTrKrl-0725863.jpg'}], 'start': 159.169, 'title': 'Nmap port scanning techniques', 'summary': 'Explores nmap port scanning techniques, covering the impact of flags on scan speed, scanning multiple ip addresses, using input files, and various scan types such as aggressive scan, service version scan, and os detection, with illustrative examples of time taken and results.', 'chapters': [{'end': 301.696, 'start': 159.169, 'title': 'Nmap port scanning basics', 'summary': 'Explains how to use nmap for port scanning, including scanning for specific ports, obtaining public ip from dns, scanning multiple hosts, and monitoring scan progress, with examples of port numbers and ip addresses.', 'duration': 142.527, 'highlights': ['Nmap can be used to scan for specific ports, such as SSH on port 22, SMTP on port 25, HTTP on port 80, RPC bind on port 111, and HTTPS on port 443. Nmap provides details of specific services working on different port numbers, such as SSH, SMTP, HTTP, RPC bind, and HTTPS.', "Nmap can translate DNS to public IP and return the public IP of the DNS server. Nmap performs DNS lookup and translates it to a recognized public IP, providing information about the DNS server's public IP.", 'Nmap can scan for multiple hosts using a single command, simplifying network scanning operations. Nmap allows scanning of multiple hosts by specifying a range of IP addresses in a single command, streamlining the network scanning process.', 'Nmap provides real-time progress updates and estimates the remaining time for the port scan. Nmap offers real-time updates on the progress of the port scan, including completion percentage and estimated time remaining for the scan.', 'Nmap identifies and explains different states of ports, including open, closed, and unavailable states, with insights into the impact of firewalls on port states. Nmap categorizes port states as open, closed, or unavailable, providing insights into the influence of firewalls on port states and the impact on scan results.']}, {'end': 745.737, 'start': 301.816, 'title': 'Nmap port scanning techniques', 'summary': 'Demonstrates nmap port scanning techniques, including the impact of flags on scan speed, scanning multiple ip addresses, using input files, and various types of scans like aggressive scan, service version scan, and os detection, with examples showing the time taken and results.', 'duration': 443.921, 'highlights': ['The F flag considerably speeds up the scanning process, reducing the time from 119 seconds to 29.91 seconds for scanning 30 IP addresses. The F flag significantly speeds up the scanning process, reducing the time from 119 seconds to 29.91 seconds for scanning 30 IP addresses.', 'Aggressive scan took 459 seconds, providing information on traceroute, TCP open, TCP wrap program versions, port types, and port states. Aggressive scan took 459 seconds, providing information on traceroute, TCP open, TCP wrap program versions, port types, and port states.', 'Service version scan took 386.34 seconds, guessing the version of services running on different ports. Service version scan took 386.34 seconds, guessing the version of services running on different ports.', 'OS detection scan took more than 10 minutes, guessing the OS based on the time to live in the response packets. OS detection scan took more than 10 minutes, guessing the OS based on the time to live in the response packets.']}], 'duration': 586.568, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/IoIsTrKrl-0/pics/IoIsTrKrl-0159169.jpg', 'highlights': ['Nmap can be used to scan for specific ports and provides details of specific services working on different port numbers.', 'Nmap allows scanning of multiple hosts by specifying a range of IP addresses in a single command, streamlining the network scanning process.', 'Nmap offers real-time updates on the progress of the port scan, including completion percentage and estimated time remaining for the scan.', 'Nmap identifies and explains different states of ports, including open, closed, and unavailable states, with insights into the impact of firewalls on port states.', 'The F flag significantly speeds up the scanning process, reducing the time from 119 seconds to 29.91 seconds for scanning 30 IP addresses.', 'Aggressive scan took 459 seconds, providing information on traceroute, TCP open, TCP wrap program versions, port types, and port states.', 'Service version scan took 386.34 seconds, guessing the version of services running on different ports.', 'OS detection scan took more than 10 minutes, guessing the OS based on the time to live in the response packets.']}, {'end': 957.4, 'segs': [{'end': 795.511, 'src': 'embed', 'start': 767.073, 'weight': 0, 'content': [{'end': 776.539, 'text': 'So I go Netflix.com and this will give me a traceroute that shows me how my packet actually reaches Netflix.com.', 'start': 767.073, 'duration': 9.466}, {'end': 781.182, 'text': 'Okay, so this is basically, it was a direct one hop.', 'start': 777.339, 'duration': 3.843}, {'end': 783.283, 'text': 'Okay, so that was surprising.', 'start': 781.722, 'duration': 1.561}, {'end': 790.107, 'text': 'On the other hand, if I were to do this on edureka.co, it would take a bunch of hops to actually reach there.', 'start': 783.703, 'duration': 6.404}, {'end': 792.529, 'text': 'Okay, this might just take some time to run.', 'start': 790.127, 'duration': 2.402}, {'end': 795.511, 'text': "Okay, so it's 94% done.", 'start': 793.509, 'duration': 2.002}], 'summary': 'Traceroute to netflix.com was one hop, while edureka.co took multiple hops, reaching 94% completion.', 'duration': 28.438, 'max_score': 767.073, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/IoIsTrKrl-0/pics/IoIsTrKrl-0767073.jpg'}, {'end': 867.179, 'src': 'embed', 'start': 816.207, 'weight': 1, 'content': [{'end': 822.553, 'text': 'Now, just to end this tutorial, let me just tell you guys, that you all can also save a file to nmap,', 'start': 816.207, 'duration': 6.346}, {'end': 828.739, 'text': 'and that is basically save all whatever you found from a search into a file, and let me just show you how to do that.', 'start': 822.553, 'duration': 6.186}, {'end': 837.027, 'text': 'Now sometimes when you are working as a security analyst you will have to perform network scans on a wide area network that is huge.', 'start': 829.08, 'duration': 7.947}, {'end': 838.369, 'text': "It's basically huge.", 'start': 837.428, 'duration': 0.941}, {'end': 848.912, 'text': "These scans take a lot of time and you don't really have the space on your command line to actually store that and see that in a way that is feasible for analysis.", 'start': 839.069, 'duration': 9.843}, {'end': 852.134, 'text': 'So what you want to do is actually save it in a file.', 'start': 849.133, 'duration': 3.001}, {'end': 857.976, 'text': 'So what you can do is say nmap on and then you can say the name of the file.', 'start': 852.554, 'duration': 5.422}, {'end': 864.618, 'text': 'We could say results.txt and we could save this in file.', 'start': 858.116, 'duration': 6.502}, {'end': 867.179, 'text': 'So www.edureka.com.', 'start': 864.698, 'duration': 2.481}], 'summary': 'Nmap allows saving scan results to a file for analysis, useful for large network scans.', 'duration': 50.972, 'max_score': 816.207, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/IoIsTrKrl-0/pics/IoIsTrKrl-0816207.jpg'}], 'start': 746.318, 'title': 'Using traceroute and nmap in network analysis', 'summary': 'Covers the usage of traceroute command to trace website paths, demonstrating 1 hop to netflix.com and 22 hops to edureka.co, and discusses saving nmap scan results into files and utilizing verbose mode for detailed scan progress, highlighting the importance of network scans in security analysis.', 'chapters': [{'end': 815.426, 'start': 746.318, 'title': 'Understanding traceroute command', 'summary': 'Explains how to use the traceroute command to trace the path to a website, demonstrating the number of hops and the process involved, such as reaching netflix.com in a direct one hop and edureka.co in 22 hops.', 'duration': 69.108, 'highlights': ['The TraceRoute command can be used to trace the path to a website, such as Netflix.com and edureka.co, revealing the number of hops required, with Netflix.com being a direct one hop and edureka.co requiring 22 hops.', 'The process involves traversing through a series of IP addresses before reaching the final destination, as demonstrated by reaching uswest to compute.amazon.ews.', 'The process of tracing the path to a website can take some time to complete, as indicated by the 94% completion status during the demonstration.']}, {'end': 957.4, 'start': 816.207, 'title': 'Nmap file saving and verbose mode', 'summary': 'Discusses how to save nmap scan results into a file and use the verbose mode for detailed scan progress, emphasizing the necessity for network scans in security analysis and the practical use of these features.', 'duration': 141.193, 'highlights': ['The necessity for network scans in security analysis is emphasized, especially for wide area networks that take a lot of time to scan and require storage in a file for feasible analysis.', 'Demonstrates the process of saving Nmap scan results into a file, highlighting the creation of a file by Nmap for storing the search results and the ability to view the stored Nmap scan results.', 'Explains the verbose mode in Nmap, showcasing its use to display detailed scan progress, providing a comprehensive understanding of the scanning process.']}], 'duration': 211.082, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/IoIsTrKrl-0/pics/IoIsTrKrl-0746318.jpg', 'highlights': ['Traceroute command traces website paths, revealing 1 hop to Netflix.com and 22 hops to edureka.co.', 'Importance of network scans in security analysis, especially for wide area networks.', 'Process of saving Nmap scan results into a file and utilizing verbose mode for detailed scan progress.']}], 'highlights': ['Nmap is a network scanner used by ethical hackers to detect unauthorized access and runs on Linux, Mac OS, and Windows.', 'Demonstrates a DNS scan on www.edureka.co, completing in 13.71 seconds.', 'Nmap can be used to scan for specific ports and provides details of specific services working on different port numbers.', 'Nmap allows scanning of multiple hosts by specifying a range of IP addresses in a single command, streamlining the network scanning process.', 'Nmap offers real-time updates on the progress of the port scan, including completion percentage and estimated time remaining for the scan.', 'The F flag significantly speeds up the scanning process, reducing the time from 119 seconds to 29.91 seconds for scanning 30 IP addresses.', 'Aggressive scan took 459 seconds, providing information on traceroute, TCP open, TCP wrap program versions, port types, and port states.', 'Service version scan took 386.34 seconds, guessing the version of services running on different ports.', 'OS detection scan took more than 10 minutes, guessing the OS based on the time to live in the response packets.', 'Traceroute command traces website paths, revealing 1 hop to Netflix.com and 22 hops to edureka.co.', 'Importance of network scans in security analysis, especially for wide area networks.', 'Process of saving Nmap scan results into a file and utilizing verbose mode for detailed scan progress.']}