Searching Saved Results | Nmap Network Scanning (2024)

  • Nmap Network Scanning
  • Chapter12.Zenmap GUI Users' Guide
  • Searching Saved Results

Searching Saved Results

Zenmap allows you to search saved scan results files and the database of recent scans. To begin searching, select Search Scan Results from the Tools menu or use the ctrl+F keyboard shortcut. The search dialog appears as shown in Figure12.13.

The search interface initially shows all the scans in the recent scans database (for which see the section called “The Recent Scans Database”). The reason all the scans are shown is simple—no restrictions have yet been placed on the search, so every possible result is returned.

Searches may be given in terms of several search criteria, however the simplest search is just a keyword search. Just type a word like scanme in the Search field to find all scans that have that word as part of their output, whether as a host name, operating system name, profile, or anything else. An example of this is shown in Figure12.14.

Figure12.14.Keyword search

Searching Saved Results | Nmap Network Scanning (2)

Searches happen live, as you type. When you have found the scan you want click the Open button or double-click on the scan name.

More complicated searches can be built up using the Expressions interface. Click the Expressions button and graphical representation of the current search will appear. Modify the search by selecting from the combo boxes displayed. Click + to add a criterion and to remove one. Click the Expressions button again to hide the criteria (they are still present in the search string). Editing of the search text is disabled while the expressions are shown. An example of a more complicated search is shown in Figure12.15.

Figure12.15.Expressions search

Searching Saved Results | Nmap Network Scanning (3)

Searches are and-based, meaning that all the criteria must be true for a scan to match and appear in the results list. Most searches are case-insensitive. (The only case-sensitive criterion is option:.) By default only the scans in the recent scans database are searched. To recursively search files in a directory, use the Include Directory expression.

You will have noticed that whenever you choose a search expression a text representation of it appears in the search entry. The string in the Search field is what really controls the search; the Expressions interface is just a convenient way to set it. When you have learned what search strings correspond to what expressions, you may skip the expressions interface and just type in a search string directly.

The following is a list of all the textual search criteria recognized by the search interface. Most criteria have a short form: d:-5 is the same as date:-5 and op:80 is the same as open:80. The short form of each criterion is given in the list below.

<keyword>

An unadorned word matches anything in a scan. For example, apache will match all Apache servers and linux will match all Linux hosts. There is a chance of false positives when using the keyword search, like if a host happens to be named apache or linux.

Port states

Every possible port state is also a search criterion. They are

open:<ports> (op: for short)
closed:<ports> (cp: for short)
filtered:<ports> (fp: for short)
unfiltered:<ports> (ufp: for short)
open|filtered:<ports> (ofp: for short)
closed|filtered:<ports> (cfp: for short)

Use open:80 to match scans that have a host with port80 open. The <ports> argument may also be a comma-separated list.

Additionally the scanned:<ports> (sp: for short) criterion matches scans in which the given ports were scanned, whatever their final state.

date:<YYYY-MM-DD> or date:-<n> (d: for short)

Matches scans that occurred on the given date in <YYYY-MM-DD> format. Or use date:-<n> to match scans that occurred any on the day <n> days ago. Use date:-1 to find scans performed yesterday.

When using the <YYYY-MM-DD> format, the date may be followed by one or more ~, each of which widens the range of dates matched by one day on both sides. date:2007-12-23 matches scans that occurred between 00:00 and 24:00 on December23, 2007. date:2007-12-23~ matches scans that took place between 00:00 on December22 and 24:00 on December24. This fuzzy date matching is useful when you can't remember exactly when you ran a scan.

after:<YYYY-MM-DD> or after:-<n> (a: for short)

Matches scans that occurred on or after the given date in <YYYY-MM-DD> format. Or use after:-<n> to match scans that occurred within the last <n> days. For example, after:-7 matches scans that happened in the last week.

before:<YYYY-MM-DD> or before:-<n> (b: for short)

Matches scans that occurred on or before the given date in <YYYY-MM-DD> format. Or use before:-<n> to match scans that occurred any time before <n> days ago.

target:<name> (t: for short)

Matches scans of any hosts with the given name. The name may be either the name specified in the scan or thereverse-DNS name of any host.

option:<option> (o: for short)

Matches scans that used the given command-line option. Omit any leading - or --: option:A matches scans that used the -A option.

This criterion matches only literally. option:O will not match scans that used -A, even though -A implies -O. Similarly option:sU will not match scans that used -sSU. Option matching is case-sensitive.

os:<string>

Matches scans of hosts with the given string in any part of their OS description. os:windows will return scans of Microsoft Windows hosts broadly.

service:<string> (s: for short)

Matches scans of hosts with the given string in any part of the service description of any of their ports. service:ssh will return scans of hosts running any type of SSH.

profile:<name> (pr: for short)

Matches scans that used the named profile, for example profile:"intensescan".

inroute:<host> (ir: for short)

Matches scans where the given host appears as an intermediate router in--traceroute output.

dir:<directory>

dir: is not really a search criterion. Rather it is the way to search a directory in the filesystem in addition to those in the recent scans database. Directories are searched recursively for files ending with certain extensions, xml only by default. To match more file names modify the file_extension variable of the [search] section of zenmap.conf according to the instructions inthe section called “Sections of zenmap.conf”.

Searching Saved Results | Nmap Network Scanning (2024)

FAQs

How to detect if someone is scanning your network? ›

Log monitoring tools such as Logwatch and Swatch can certainly help, but the reality is that system logs are only marginally effective at detecting Nmap activity. Special purpose port scan detectors are a more effective approach to detecting Nmap activity. Two common examples are PortSentry and Scanlogd.

Can port scanning be detected? ›

Though there are a number of ways to detect an active network scan, the primary detection tool is an Intrusion Detection System (IDS) and Intrusion Prevention System (IPS).

Which of the following commands is used to save scan results to a file? ›

To save an individual scan to a file, choose “Save Scan” from the “Scan” menu (or use the keyboard shortcut ctrl+S). If there is more than one scan into the inventory you will be asked which one you want to save.

Where can I find Nmap scan results? ›

The “Nmap Output” tab is displayed by default when a scan is run. It shows the familiar Nmap terminal output. The display highlights parts of the output according to their meaning; for example, open and closed ports are displayed in different colors.

How do I scan all devices on my network? ›

How to manually identify unknown devices on a network
  1. Open the Command prompt or Terminal in your Windows, Linux, or macOS system.
  2. Search all the network settings, such as default gateway and IP address, through the command prompt.
  3. Type the command "arp -a" to view the list of all IP addresses connected to your network.

What does scanning a network do? ›

Network scanning involves systematically scanning a computer network to identify active hosts, open ports, and other vital information. It helps assess network security, detect vulnerabilities, and maintain network health and performance.

How to prevent network scanning? ›

A strong firewall: A firewall can prevent unauthorized access to a business's private network. It controls ports and their visibility, as well as detects when a port scan is in progress before shutting it down.

Is it illegal to port scan a network? ›

Fundamentally, it is not a crime to conduct a port scan in the United States or the European Union. This means that it isn't criminalized at the state, federal, or local levels. However, the issue of consent can still cause legal problems for unauthorized port scans and vulnerability scans.

What is the difference between network scanning and port scanning? ›

Network scanning involves detecting all active hosts on a network and mapping them to their IP addresses. Port scanning refers to the process of sending packets to specific ports on a host and analyzing the responses to learn details about its running services or locate potential vulnerabilities.

What file do scans go to? ›

Scanned documents are typically saved in the "Documents" or "Pictures" folder on your PC.

How would you tell Nmap to scan all ports? ›

-p0- asks Nmap to scan every possible TCP port, -v asks Nmap to be verbose about it, -A enables aggressive tests such as remote OS detection, service/version detection, and the Nmap Scripting Engine (NSE).

What is scan command? ›

Description. The scan command displays a line of information about the messages in a specified folder. Each line gives the message number, date, sender, subject, and as much of the message body as possible.

What is the most powerful Nmap scan? ›

Port scanning.

One of the most powerful features of Nmap is Nmap Scripting Engine (NSE). NSE enables users to write scripts to automate various network tasks. Nmap uses Lua, an embedded programming language, for writing scripts.

How can we detect if someone is using Nmap? ›

Turn on verbose logging on your system, then check and see which IP addresses are sending out probes to your system. Nmap does not have a specific profile to look for because it tries many techniques on it's target.

Which scan is the most reliable Nmap scan? ›

SYN scan is the default and most popular scan option for good reasons. It can be performed quickly, scanning thousands of ports per second on a fast network not hampered by restrictive firewalls. It is also relatively unobtrusive and stealthy since it never completes TCP connections.

How to tell if Nmap is running? ›

Use ps -aux , nmap should appear as a running process.

How can I scan my home network? ›

To rapidly scan a network yourself using native operating system (OS) capabilities, follow these steps.
  1. Open the command prompt.
  2. Enter the command “ipconfig” for Mac or “ifconfig” on Linux. ...
  3. Next, input the command “arp -a”. ...
  4. Optional: Input the command “ping -t”.
Jan 4, 2023

Top Articles
What does Overwinding and Underwinding a pickup do?
Is Someone Accessing Your iPhone Remotely
The Tribes and Castes of the Central Provinces of India, Volume 3
Victor Spizzirri Linkedin
Craigslist Houses For Rent In Denver Colorado
DPhil Research - List of thesis titles
How To Get Free Credits On Smartjailmail
Miles City Montana Craigslist
Hallowed Sepulchre Instances &amp; More
What Was D-Day Weegy
Morgan Wallen Pnc Park Seating Chart
Calmspirits Clapper
Saberhealth Time Track
Red Devil 9664D Snowblower Manual
The Menu Showtimes Near Regal Edwards Ontario Mountain Village
Mikayla Campinos Laek: The Rising Star Of Social Media
ELT Concourse Delta: preparing for Module Two
Mc Donald's Bruck - Fast-Food-Restaurant
Atdhe Net
Puretalkusa.com/Amac
R&S Auto Lockridge Iowa
A Cup of Cozy – Podcast
Speechwire Login
Albertville Memorial Funeral Home Obituaries
Shoe Station Store Locator
Why comparing against exchange rates from Google is wrong
Progressbook Newark
Fox And Friends Mega Morning Deals July 2022
Southern Democrat vs. MAGA Republican: Why NC governor race is a defining contest for 2024
Ourhotwifes
Bratislava | Location, Map, History, Culture, & Facts
W B Crumel Funeral Home Obituaries
Samsung 9C8
Raising Canes Franchise Cost
Spectrum Outage in Genoa City, Wisconsin
Trap Candy Strain Leafly
18006548818
Sarahbustani Boobs
✨ Flysheet for Alpha Wall Tent, Guy Ropes, D-Ring, Metal Runner & Stakes Included for Hunting, Family Camping & Outdoor Activities (12'x14', PE) — 🛍️ The Retail Market
Online-Reservierungen - Booqable Vermietungssoftware
Accident On 40 East Today
Mountainstar Mychart Login
303-615-0055
Www.homedepot .Com
Madden 23 Can't Hire Offensive Coordinator
Mmastreams.com
Treatise On Jewelcrafting
Rise Meadville Reviews
Jesus Calling Oct 6
Elizabethtown Mesothelioma Legal Question
Cbs Scores Mlb
Latest Posts
Article information

Author: Lakeisha Bayer VM

Last Updated:

Views: 5945

Rating: 4.9 / 5 (69 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Lakeisha Bayer VM

Birthday: 1997-10-17

Address: Suite 835 34136 Adrian Mountains, Floydton, UT 81036

Phone: +3571527672278

Job: Manufacturing Agent

Hobby: Skimboarding, Photography, Roller skating, Knife making, Paintball, Embroidery, Gunsmithing

Introduction: My name is Lakeisha Bayer VM, I am a brainy, kind, enchanting, healthy, lovely, clean, witty person who loves writing and wants to share my knowledge and understanding with you.