Breaking News

Scanning With Nmap Using Output Options in Kali Linux

Penetration Testing: Phase 2- Scanning: Part 4:

Output options in Nmap

There are ordinarily that the penetration tester does not need the Nmap scan to be output to the screen but instead saved to a document. This is possible by redirecting with the pipe command (j), yet for this part the Nmap scan output choices will be eiscriebed. These include ordinary, XML, and Grepable. For these examples, the metasploitable target at 192.168.56.115 will be utilized and the fitting broadening will be utilized with the document name “metascan”.

-oN Normal Output

The –oN option will create a text file that can be used to examine the scan results or use as target file for other tools.

#nmap –oN /Destination_Location/metascan.txt 192.168.56.115

-oN Normal Output in Nmap

-oX Extensible Markup Language (XML) Output

This –oX option is used to input into a number of different tools for evaluating or processing

#namp –oX /Destination_Location/metascan.xml 192.168.56.115

-oX Extensible Markup Language (XML) Output in Nmap

-oG GREPable Output

Grepable yield is regularly utilized by penetration testing to permit further examination utilizing tools like GREP, however can additionally be looked utilizing apparatuses like AWK, SED, and DIFF.

#nmap –oG /Destination_Location/metascan.txt 192.168.56.115

-oS ScRipt Kidd|# Output in Nmap

-oS ScRipt Kidd|# Output

While not utilized for genuine penetration testing, the script kiddie output can be enjoyable to use now and again. This output technique ought not be utilized for genuine outputs as it uses the “leet” talk utilized by numerous that generally penetration tester would call “script Kiddies.”

#nmap –oG /Destination_Location/metascan.txt 192.168.56.115

-oG GREPable Output in Nmap

About Vijay Kumar

Ethical Hacking & Penetration Testing Trainer, For more detail view My Profile

Check Also

Scan Network with Metasploit

Scanning with Metasploit in Kali Linux

Scanning with Metasploit in Kali Linux  Step First: Creating New Project Inside metasploit community a …

Leave a Reply

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Please wait...

Get Instant Updates into Your Inbox

Want to be notified when our article is published? Enter your email address and name below to be the first to know.

Watch Dragon ball super