Example 14-2 Using Nmap to Get Details About a
Host or an IP Address
Click here to view code image
$ nmap -vv http://www.google.com
Starting Nmap 7.80 ( https://nmap.org ) at
2019-12-08 22:10 PST
Warning: Hostname http://www.google.com resolves to 2
IPs. Using 216.58.194.196.
Initiating Ping Scan at 22:10
Scanning http://www.google.com (216.58.194.196) [2
ports]
Completed Ping Scan at 22:10, 0.02s elapsed (1
total hosts)
Initiating Parallel DNS resolution of 1 host.
at 22:10
Completed Parallel DNS resolution of 1 host. at
22:10, 0.06s elapsed
Initiating Connect Scan at 22:10
Scanning http://www.google.com (216.58.194.196) [1000
ports]
Discovered open port 443/tcp on 216.58.194.196
Discovered open port 80/tcp on 216.58.194.196
Completed Connect Scan at 22:10, 8.49s elapsed
(1000 total ports)
Nmap scan report for http://www.google.com
(216.58.194.196)
Host is up, received syn-ack (0.025s latency).
Other addresses for http://www.google.com (not
scanned): 2607:f8b0:4005:804::2004
rDNS record for 216.58.194.196: sfo03s01-in-
f196.1e100.net
Scanned at 2019-12-08 22:10:05 PST for 9s
Not shown: 998 filtered ports
Reason: 998 no-responses
PORT STATE SERVICE REASON
80/tcp open http syn-ack
443/tcp open https syn-ack
CVE Detection Using Nmap
One of Nmap’s most magnificent features for finding
vulnerabilities is called the Nmap Scripting Engine
(NSE). The NSE allows you to use a predefined script or
even write your own by using Lua programming
language.