Nmap
The industry-standard network mapper for host discovery, port scanning, OS detection, and security auditing across networks of any scale.
Developer
Gordon Lyon (Fyodor) & Community
description Technical Dossier
Nmap (Network Mapper) is the world’s most widely used network reconnaissance and security auditing tool. It operates by crafting and transmitting raw IP packets to target hosts and analyzing the responses, supporting over a dozen scan techniques. TCP SYN stealth scanning sends a SYN packet and interprets the response without completing a full TCP handshake, allowing fast, less-logged enumeration. UDP, FIN, Xmas, NULL, and ACK scans provide additional options for evading firewall rules or probing stateless services. Nmap classifies each port as open, closed, filtered, or unfiltered, and can sweep entire subnets in seconds on a LAN.
Beyond port discovery, Nmap performs OS detection by analyzing quirks in a target’s TCP/IP stack implementation — examining initial TTL, window size, TCP options ordering, and ICMP response behavior against a database of thousands of OS fingerprints. Service version detection probes open ports with protocol-specific payloads to identify exact application names and version strings. The Nmap Scripting Engine (NSE) extends this dramatically: written in Lua, it includes over 600 built-in scripts categorized as discovery, auth, brute, vuln, exploit, and more, enabling operators to automate CVE checks, enumerate SMB shares, test SSL configurations, and detect malware backdoors in a single scan pass.
First published in a 1997 Phrack Magazine article, Nmap has been continuously developed for nearly three decades and is used by penetration testers, system administrators, and defenders worldwide. It ships with Zenmap (a cross-platform GUI), Ncat (a modern netcat replacement), Ndiff (scan comparison tool), and Nping (packet generation tool), making it a comprehensive network analysis suite rather than a single utility.
radar Port Scanning & State Detection
Identifies open, closed, and filtered TCP/UDP ports using SYN stealth, connect, ACK, UDP, and other scan types across single hosts or entire CIDR ranges.
fingerprint OS & Service Fingerprinting
Detects remote operating systems via TCP/IP stack analysis and identifies exact service versions with protocol-specific probes.
code Nmap Scripting Engine
Embedded Lua scripting engine with 600+ community scripts for vulnerability checks, brute-force testing, backdoor detection, and custom protocol interactions.
hub Network Topology Mapping
Host discovery via ping sweeps, ARP, and DNS combined with traceroute to build complete network maps for asset management and audits.
Distribution Model
Open Source
Free community edition available.
Enterprise support on request.

Scan Techniques
12+ TYPES
NSE Scripts
600+
OS Fingerprints
THOUSANDS
License
NPSL