Nmap is used for network scanning to map the network, identify devices, and assess their status. It helps determine open ports and services running on a particular endpoint or server within an enterprise environment.
Cyber Security Consultant - APAC at Logon Software
Real User
Top 5
2024-04-17T10:23:06Z
Apr 17, 2024
I use the tool as a vulnerability scanner to scan the network and identify vulnerabilities on each machine. It's especially useful for addressing vulnerabilities and identifying devices missing updates or out of warranty. This tool helps detect and discover assets before they become vulnerable, allowing me to address issues.
CEO at a tech services company with 11-50 employees
Real User
Top 10
2024-02-09T04:33:26Z
Feb 9, 2024
I used Nmap to identify and track specific communication protocols on a restricted government network to verify claims of illegal activity and ultimately prove that the network was not being used for that purpose. The area we operate in is very restricted. It's a hilly area for telecommunications, and it's a restricted area. So, as we operate there for one of the government projects, we implemented the setup for communication purposes. However, the authority received a claim from a third party that someone was using VIP on this network, and being a purely government entity, does not have any intention of that. The spectrum authority claimed that this was the situation, and they initiated a letter and established a team to verify this. At that time, they weren't aware of any software that could track the communication protocols they were using. So, I used the Nmap solution there. We found every single port, and all the communications, and we proved that there was no VIP-related activity because security-wise, it's illegal.
Nmap is a vulnerability assessment tool. It scans the target system and finds the vulnerabilities within the systems. We have network devices, servers, endpoints, mobile devices. It connects with the device for any vulnerability that can be used before the exchange rate case. It lists in a nice report with some recommendations.
Network Administrator at a financial services firm with 1,001-5,000 employees
Real User
Top 5
2023-11-06T17:32:21Z
Nov 6, 2023
I use Nmap just for vulnerability assessment, especially for network discovery. I can scan a network and get total information about the device, the operating system, IP, and all of the services running. So, Nmap is one of the good tools.
We use Nmap for network monitoring and checking. It helps us establish network communication to get a clear text. If there is any network device on our premises, we can catch it for monitoring.
I have a network consisting of about 800 machines running either Windows, Linux, or macOS, with a security firewall provided by Check Point (1800 model). Within this network environment, I use a non-customized version of Nmap on my Linux PC as a network scanner, or "network mapper". As a network mapper, Nmap enables me to scan the network and uncover information relating to each device on the network in order to identify vulnerabilities, which is one of the main responsibilities of my job. My main use case is figuring out which kinds of devices are connected on the same network (e.g. servers, browser clients, switches), but on a lower level I also it use to check which ports are open or closed or not on any given machine. Additionally, I occasionally use it to identify which operating systems are running on specific machines.
System Network Administrator at Mungi Engineers Pvt. Ltd.
Real User
Top 20
2022-11-04T15:22:25Z
Nov 4, 2022
We are a manufacturing company and there are two main ways in which we use Nmap. The first way is using Nmap as a tool to determine whether certain services are running or whether certain ports are open. If a machine is not available for some reason, then we will first use Nmap to check whether the machine's ports are open or not. This is our most common use case. The other reason we use Nmap is to gather the MAC addresses of all the machines in the network. In total, there are about two or three people who use Nmap at my company because we are working in manufacturing and only require a few people to perform this kind of networking troubleshooting.
Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they...
Nmap is used for network scanning to map the network, identify devices, and assess their status. It helps determine open ports and services running on a particular endpoint or server within an enterprise environment.
I use the tool as a vulnerability scanner to scan the network and identify vulnerabilities on each machine. It's especially useful for addressing vulnerabilities and identifying devices missing updates or out of warranty. This tool helps detect and discover assets before they become vulnerable, allowing me to address issues.
I used Nmap to identify and track specific communication protocols on a restricted government network to verify claims of illegal activity and ultimately prove that the network was not being used for that purpose. The area we operate in is very restricted. It's a hilly area for telecommunications, and it's a restricted area. So, as we operate there for one of the government projects, we implemented the setup for communication purposes. However, the authority received a claim from a third party that someone was using VIP on this network, and being a purely government entity, does not have any intention of that. The spectrum authority claimed that this was the situation, and they initiated a letter and established a team to verify this. At that time, they weren't aware of any software that could track the communication protocols they were using. So, I used the Nmap solution there. We found every single port, and all the communications, and we proved that there was no VIP-related activity because security-wise, it's illegal.
Nmap works as a basic diagnostic and security tool. It helps us discover open ports and check connectivity.
We use the solution to add up the router on a network.
Nmap is a vulnerability assessment tool. It scans the target system and finds the vulnerabilities within the systems. We have network devices, servers, endpoints, mobile devices. It connects with the device for any vulnerability that can be used before the exchange rate case. It lists in a nice report with some recommendations.
I use Nmap just for vulnerability assessment, especially for network discovery. I can scan a network and get total information about the device, the operating system, IP, and all of the services running. So, Nmap is one of the good tools.
We use it to obtain information about the target entity, such as its services, open ports, and potentially even its operating system.
We use the solution to scan and monitor ports. We can get insights into operating systems, status, protocols, and services.
We use Nmap for network monitoring and checking. It helps us establish network communication to get a clear text. If there is any network device on our premises, we can catch it for monitoring.
I have a network consisting of about 800 machines running either Windows, Linux, or macOS, with a security firewall provided by Check Point (1800 model). Within this network environment, I use a non-customized version of Nmap on my Linux PC as a network scanner, or "network mapper". As a network mapper, Nmap enables me to scan the network and uncover information relating to each device on the network in order to identify vulnerabilities, which is one of the main responsibilities of my job. My main use case is figuring out which kinds of devices are connected on the same network (e.g. servers, browser clients, switches), but on a lower level I also it use to check which ports are open or closed or not on any given machine. Additionally, I occasionally use it to identify which operating systems are running on specific machines.
We are a manufacturing company and there are two main ways in which we use Nmap. The first way is using Nmap as a tool to determine whether certain services are running or whether certain ports are open. If a machine is not available for some reason, then we will first use Nmap to check whether the machine's ports are open or not. This is our most common use case. The other reason we use Nmap is to gather the MAC addresses of all the machines in the network. In total, there are about two or three people who use Nmap at my company because we are working in manufacturing and only require a few people to perform this kind of networking troubleshooting.
Three technicians in our company use the solution extensively to scan our environment and find security holes.
Nmap is a tool for analyzing perimeter security and application output.