Searching Saved Results | Nmap Network Scanning (2024)

  • Nmap Network Scanning
  • Chapter12.Zenmap GUI Users' Guide
  • Searching Saved Results

Searching Saved Results

Zenmap allows you to search saved scan results files and the database of recent scans. To begin searching, select Search Scan Results from the Tools menu or use the ctrl+F keyboard shortcut. The search dialog appears as shown in Figure12.13.

The search interface initially shows all the scans in the recent scans database (for which see the section called “The Recent Scans Database”). The reason all the scans are shown is simple—no restrictions have yet been placed on the search, so every possible result is returned.

Searches may be given in terms of several search criteria, however the simplest search is just a keyword search. Just type a word like scanme in the Search field to find all scans that have that word as part of their output, whether as a host name, operating system name, profile, or anything else. An example of this is shown in Figure12.14.

Figure12.14.Keyword search

Searching Saved Results | Nmap Network Scanning (2)

Searches happen live, as you type. When you have found the scan you want click the Open button or double-click on the scan name.

More complicated searches can be built up using the Expressions interface. Click the Expressions button and graphical representation of the current search will appear. Modify the search by selecting from the combo boxes displayed. Click + to add a criterion and to remove one. Click the Expressions button again to hide the criteria (they are still present in the search string). Editing of the search text is disabled while the expressions are shown. An example of a more complicated search is shown in Figure12.15.

Figure12.15.Expressions search

Searching Saved Results | Nmap Network Scanning (3)

Searches are and-based, meaning that all the criteria must be true for a scan to match and appear in the results list. Most searches are case-insensitive. (The only case-sensitive criterion is option:.) By default only the scans in the recent scans database are searched. To recursively search files in a directory, use the Include Directory expression.

You will have noticed that whenever you choose a search expression a text representation of it appears in the search entry. The string in the Search field is what really controls the search; the Expressions interface is just a convenient way to set it. When you have learned what search strings correspond to what expressions, you may skip the expressions interface and just type in a search string directly.

The following is a list of all the textual search criteria recognized by the search interface. Most criteria have a short form: d:-5 is the same as date:-5 and op:80 is the same as open:80. The short form of each criterion is given in the list below.

<keyword>

An unadorned word matches anything in a scan. For example, apache will match all Apache servers and linux will match all Linux hosts. There is a chance of false positives when using the keyword search, like if a host happens to be named apache or linux.

Port states

Every possible port state is also a search criterion. They are

open:<ports> (op: for short)
closed:<ports> (cp: for short)
filtered:<ports> (fp: for short)
unfiltered:<ports> (ufp: for short)
open|filtered:<ports> (ofp: for short)
closed|filtered:<ports> (cfp: for short)

Use open:80 to match scans that have a host with port80 open. The <ports> argument may also be a comma-separated list.

Additionally the scanned:<ports> (sp: for short) criterion matches scans in which the given ports were scanned, whatever their final state.

date:<YYYY-MM-DD> or date:-<n> (d: for short)

Matches scans that occurred on the given date in <YYYY-MM-DD> format. Or use date:-<n> to match scans that occurred any on the day <n> days ago. Use date:-1 to find scans performed yesterday.

When using the <YYYY-MM-DD> format, the date may be followed by one or more ~, each of which widens the range of dates matched by one day on both sides. date:2007-12-23 matches scans that occurred between 00:00 and 24:00 on December23, 2007. date:2007-12-23~ matches scans that took place between 00:00 on December22 and 24:00 on December24. This fuzzy date matching is useful when you can't remember exactly when you ran a scan.

after:<YYYY-MM-DD> or after:-<n> (a: for short)

Matches scans that occurred on or after the given date in <YYYY-MM-DD> format. Or use after:-<n> to match scans that occurred within the last <n> days. For example, after:-7 matches scans that happened in the last week.

before:<YYYY-MM-DD> or before:-<n> (b: for short)

Matches scans that occurred on or before the given date in <YYYY-MM-DD> format. Or use before:-<n> to match scans that occurred any time before <n> days ago.

target:<name> (t: for short)

Matches scans of any hosts with the given name. The name may be either the name specified in the scan or thereverse-DNS name of any host.

option:<option> (o: for short)

Matches scans that used the given command-line option. Omit any leading - or --: option:A matches scans that used the -A option.

This criterion matches only literally. option:O will not match scans that used -A, even though -A implies -O. Similarly option:sU will not match scans that used -sSU. Option matching is case-sensitive.

os:<string>

Matches scans of hosts with the given string in any part of their OS description. os:windows will return scans of Microsoft Windows hosts broadly.

service:<string> (s: for short)

Matches scans of hosts with the given string in any part of the service description of any of their ports. service:ssh will return scans of hosts running any type of SSH.

profile:<name> (pr: for short)

Matches scans that used the named profile, for example profile:"intensescan".

inroute:<host> (ir: for short)

Matches scans where the given host appears as an intermediate router in--traceroute output.

dir:<directory>

dir: is not really a search criterion. Rather it is the way to search a directory in the filesystem in addition to those in the recent scans database. Directories are searched recursively for files ending with certain extensions, xml only by default. To match more file names modify the file_extension variable of the [search] section of zenmap.conf according to the instructions inthe section called “Sections of zenmap.conf”.

Searching Saved Results | Nmap Network Scanning (2024)

FAQs

How to detect if someone is scanning your network? ›

Log monitoring tools such as Logwatch and Swatch can certainly help, but the reality is that system logs are only marginally effective at detecting Nmap activity. Special purpose port scan detectors are a more effective approach to detecting Nmap activity. Two common examples are PortSentry and Scanlogd.

Can port scanning be detected? ›

Though there are a number of ways to detect an active network scan, the primary detection tool is an Intrusion Detection System (IDS) and Intrusion Prevention System (IPS).

Which of the following commands is used to save scan results to a file? ›

To save an individual scan to a file, choose “Save Scan” from the “Scan” menu (or use the keyboard shortcut ctrl+S). If there is more than one scan into the inventory you will be asked which one you want to save.

Where can I find Nmap scan results? ›

The “Nmap Output” tab is displayed by default when a scan is run. It shows the familiar Nmap terminal output. The display highlights parts of the output according to their meaning; for example, open and closed ports are displayed in different colors.

How do I scan all devices on my network? ›

How to manually identify unknown devices on a network
  1. Open the Command prompt or Terminal in your Windows, Linux, or macOS system.
  2. Search all the network settings, such as default gateway and IP address, through the command prompt.
  3. Type the command "arp -a" to view the list of all IP addresses connected to your network.

What does scanning a network do? ›

Network scanning involves systematically scanning a computer network to identify active hosts, open ports, and other vital information. It helps assess network security, detect vulnerabilities, and maintain network health and performance.

How to prevent network scanning? ›

A strong firewall: A firewall can prevent unauthorized access to a business's private network. It controls ports and their visibility, as well as detects when a port scan is in progress before shutting it down.

Is it illegal to port scan a network? ›

Fundamentally, it is not a crime to conduct a port scan in the United States or the European Union. This means that it isn't criminalized at the state, federal, or local levels. However, the issue of consent can still cause legal problems for unauthorized port scans and vulnerability scans.

What is the difference between network scanning and port scanning? ›

Network scanning involves detecting all active hosts on a network and mapping them to their IP addresses. Port scanning refers to the process of sending packets to specific ports on a host and analyzing the responses to learn details about its running services or locate potential vulnerabilities.

What file do scans go to? ›

Scanned documents are typically saved in the "Documents" or "Pictures" folder on your PC.

How would you tell Nmap to scan all ports? ›

-p0- asks Nmap to scan every possible TCP port, -v asks Nmap to be verbose about it, -A enables aggressive tests such as remote OS detection, service/version detection, and the Nmap Scripting Engine (NSE).

What is scan command? ›

Description. The scan command displays a line of information about the messages in a specified folder. Each line gives the message number, date, sender, subject, and as much of the message body as possible.

What is the most powerful Nmap scan? ›

Port scanning.

One of the most powerful features of Nmap is Nmap Scripting Engine (NSE). NSE enables users to write scripts to automate various network tasks. Nmap uses Lua, an embedded programming language, for writing scripts.

How can we detect if someone is using Nmap? ›

Turn on verbose logging on your system, then check and see which IP addresses are sending out probes to your system. Nmap does not have a specific profile to look for because it tries many techniques on it's target.

Which scan is the most reliable Nmap scan? ›

SYN scan is the default and most popular scan option for good reasons. It can be performed quickly, scanning thousands of ports per second on a fast network not hampered by restrictive firewalls. It is also relatively unobtrusive and stealthy since it never completes TCP connections.

How to tell if Nmap is running? ›

Use ps -aux , nmap should appear as a running process.

How can I scan my home network? ›

To rapidly scan a network yourself using native operating system (OS) capabilities, follow these steps.
  1. Open the command prompt.
  2. Enter the command “ipconfig” for Mac or “ifconfig” on Linux. ...
  3. Next, input the command “arp -a”. ...
  4. Optional: Input the command “ping -t”.
Jan 4, 2023

Top Articles
Types of liquidity - FasterCapital
25 Amazing Hobbies For Students To Develop In 2024 | Amber
It's Official: Sabrina Carpenter's Bangs Are Taking Over TikTok
Restaurer Triple Vitrage
Botw Royal Guard
Repentance (2 Corinthians 7:10) – West Palm Beach church of Christ
Workday Latech Edu
Craigslist Cars And Trucks For Sale By Owner Indianapolis
Bucks County Job Requisitions
Mawal Gameroom Download
Atrium Shift Select
Pbr Wisconsin Baseball
Legacy First National Bank
Craigslistdaytona
Https //Advanceautoparts.4Myrebate.com
More Apt To Complain Crossword
Love In The Air Ep 9 Eng Sub Dailymotion
New Stores Coming To Canton Ohio 2022
Patrick Bateman Notebook
91 East Freeway Accident Today 2022
ZURU - XSHOT - Insanity Mad Mega Barrel - Speelgoedblaster - Met 72 pijltjes | bol
Where Is George The Pet Collector
Dallas Craigslist Org Dallas
Invitation Homes plans to spend $1 billion buying houses in an already overheated market. Here's its presentation to investors setting out its playbook.
Encore Atlanta Cheer Competition
Babbychula
Discord Nuker Bot Invite
Gilchrist Verband - Lumedis - Ihre Schulterspezialisten
Spiritual Meaning Of Snake Tattoo: Healing And Rebirth!
Die 8 Rollen einer Führungskraft
What Sells at Flea Markets: 20 Profitable Items
The Fabelmans Showtimes Near Baton Rouge
Lilpeachbutt69 Stephanie Chavez
Craftsman Yt3000 Oil Capacity
Uno Fall 2023 Calendar
Petsmart Distribution Center Jobs
2012 Street Glide Blue Book Value
Louisville Volleyball Team Leaks
Leatherwall Ll Classifieds
Sam's Club Gas Prices Deptford Nj
303-615-0055
Jasgotgass2
Nami Op.gg
Rage Of Harrogath Bugged
Promo Code Blackout Bingo 2023
Tinfoil Unable To Start Software 2022
Nope 123Movies Full
DL381 Delta Air Lines Estado de vuelo Hoy y Historial 2024 | Trip.com
Dayton Overdrive
Ronnie Mcnu*t Uncensored
Sdn Dds
Latest Posts
Article information

Author: Lakeisha Bayer VM

Last Updated:

Views: 5945

Rating: 4.9 / 5 (69 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Lakeisha Bayer VM

Birthday: 1997-10-17

Address: Suite 835 34136 Adrian Mountains, Floydton, UT 81036

Phone: +3571527672278

Job: Manufacturing Agent

Hobby: Skimboarding, Photography, Roller skating, Knife making, Paintball, Embroidery, Gunsmithing

Introduction: My name is Lakeisha Bayer VM, I am a brainy, kind, enchanting, healthy, lovely, clean, witty person who loves writing and wants to share my knowledge and understanding with you.