Da 17 anni aiutiamo le aziende
a scegliere i migliori software
Informazioni su Nmap
Soluzione on-premise per le aziende, per gestire la mappatura della rete e il controllo della sicurezza tramite programmi di aggiornamento del servizio, monitoraggio dell'host e altro ancora.
The price is right and it does a lot while only consuming a little resources. Useful for network scanning and penetration information gathering.
The number of NSE scripts is limited. Generated reports are basic.
Filtra le recensioni (53)
Utilizzo
Ordina per
Filtra le recensioni (53)
Monitorare la sicurezza della rete con facilità
Aspetti positivi:
Nmap offre molte funzioni utili per l'esplorazione di reti, come la scansione di porte, l'identificazione di sistemi operativi, la ricerca di vulnerabilità e molto altro ancora. Mi è piaciuto moltissimo il fatto che Nmap può essere personalizzato per adattarsi alle esigenze specifiche dell'utente, con opzioni di scansione e di output configurabili
Aspetti negativi:
Nmap può essere utilizzato per attacchi informatici e violazioni della sicurezza informatica, quindi può essere considerato una minaccia per la sicurezza delle reti se utilizzato da persone malintenzionate
The Best Network Scanner I Ever Used.
Commenti: Nmap is the first tool i use to scan any network , because i am really used to it and i really like how it works. We use Nmap to scan and find out the computers are connected to our network and find open ports and its been really easy becuase of nmap.
Aspetti positivi:
With a simple scan of our network using Nmap will return all the computers and devices that are in the network. We get all the IP Address of the Computers By Scanning the network. And i really like that we can find open ports in our networks using. There are lots of different types of scan that we can do on our network using Namap, And there is a feature that i like which is we can find out which operating system are they using from their IP Address.
Aspetti negativi:
Nmap is really great. But there is learning curve, It takes time to understand how it works , like we need some time to get used to its commands in order to get the real use out of nmap. Sometimes It takes longer than we expected to finish the scan, but we can alter the commands and change it to some specific type of scanning to make the scan more fast.
Alternative considerate:
The Best Network Scanner Ever
Commenti: This is the best tool I ever had to do network scanning. It was very easy to understand and detect vulnerable ports, hosts and IP addresses of our customers.
Aspetti positivi:
We can do lots of scans using this simple tool. There are different types of scans available (ex: - Ports scan, Host discovery etc.).
Aspetti negativi:
It is suitable for beginners as well as professionals. But, it will take time to understand what are the functionalities of Nmap
Essential Security Tool
Aspetti positivi:
Nmap is one of those tools that every network administrator and security professional should have in their toolkit. It’s incredibly versatile, offering everything from basic port scanning to advanced network exploration and security auditing. It’s also completely free and open-source, which makes it accessible for anyone, whether you're running a small home network or managing a massive enterprise environment. It's also highly customizable with scripts, which adds even more power and flexibility to what it can do.
Aspetti negativi:
Nmap has a steep learning curve can be a bit of challenging for newcomers, especially if you’re not already familiar with networking concepts.
basic tool that gives you the basics
Commenti:
basic tool ,that gives you the basics ,
Nothing more and nothing less,
The fact that it is for free can contribute to the fact im using it but there are better tools that are free and far better.
Aspetti positivi:
free ,quick and gives you the basic network features.
Aspetti negativi:
gui is far from being defined as "readable"
Alternative considerate:
Best network discovery tool
Aspetti positivi:
Nmap has excellent discovery tools and nmap script engine makes nmap the best tool not only for network discovery but also for asset management, for network perimeter security by checking different ports and protocols exposed and for reconnaissance.
Aspetti negativi:
Reporting for nmap can be a lot better as right now it only supports generating XML files. Reporting features must include variety of different formats like printing out a whole network map etc.
A critical tool for any security professional
Commenti: Amazing scanning tool to looks for ports and identify vulnerabilities. you can use it run an internal security assessment to help you understand your security posture
Aspetti positivi:
A super simple efficient tool for any security professional. If you are red/blue team using Nmap will be a tool that needs to be part of your arsenal
Aspetti negativi:
The automation with other security tools could be better so we can create more sofisticated scripts but in general is amazing tool
Nmap network mapper Almost a perfect flexible scanning tool
Commenti: Cool tool. Quick ease and you can modify as per requirements.
Aspetti positivi:
- Easy Manipulation of options - Shows all ports with their present states - Does common directory traversals - Quick and trusted - Adding scripts is the best part and has scripts for almost every type of scanning
Aspetti negativi:
- Looking for more trusted results in case of web applications - More options to monitor firewalls and support for some more scripts like metasploit database
The best network enumeration tool available.
Commenti: Very decent and powerful tool network scanning.
Aspetti positivi:
Nmap network scanner can supports scanning for individual IP's and whole subnet. Nmap has multiple scan profiles such as ping scan, no ping scan, it also supports scan based on UDP and TCP ports and traceroute scan. Nmap can enumerate all the information about the target IP such as Operating system, version detection, device type, network distance and it also gives graphic network topology diagram after the scan is complete! This tool can be used using command line and also has graphical GUI and supports operating systems like windows, Linux. It has many NSE scripts comes with application package like ssl-cert, http-enum for SSL certificate enumerations, http related enumerations and many more
Aspetti negativi:
This can be hard to use using command line if the user does not know the necessary commands and scripts
Great tool for network or system admin
Commenti: I have used nmap in the past if i found a unknown device on my network i will use Nmap on the corporate lan and scan the machine to get OS info, mac and general information on it. With the MAC i can then go to the switch and track down where it is located in the building.
Aspetti positivi:
The software has so many features and can do so many different things. You can scan for specific Packet types in TCP or UDP you can scan entire ranges or machines for open ports exposing security flaws.
Aspetti negativi:
This program is a BEAST. I took several different classes on using this program as it is extremely powerful and can cause issues if used incorrectly in a production environment and could also be prosecuted legally if the owner of said network chooses too.
Amazing tool for enumerating apps/networks
Commenti: We use Nmap for every pen test, or network enumeration scan to get an assessment on the network we're working on.
Aspetti positivi:
Nmap just works, it's become the standard for enumerating any box/server/wep app. It works well, and in most cases, returns results fairly quickly (Also depending on your settings).
Aspetti negativi:
There's a tiny learning curve if you're not familiar with the command line (since there's no GUI for Nmap) - So you'll definitely have to take some time learning the commands/options.
Nmap: Time-tested penetration testing tool for network security
Commenti: Great penetration testing tool. A necessary tool to use in any network security discipline.
Aspetti positivi:
I used Nmap to simulate many network attacks on servers and operating systems as part of my cryptography and network security courses. We usually test DoS flooding, fingerprinting, and port scanning attacks to stand on the hardness of a victim server and the vulnerabilities in its operating system and networking stack. Syn flooding attacks using TCP and UDP flooding attacks can be easily tested using basic command in nmap, even constructing customized TCP/IP packet structures can be a very basic task using nmap. I like that nmap is almost present by default in main Linux distributions. It is open-source and can be used after being acquainted with the command structure.
Aspetti negativi:
Would be very glad to see a GUI version for nmap to make using it a bit more facilitated for non-technical people. However, simple references on the different commands in nmap can be found almost everywhere over the internet.
NMap: Still the Best Penetration Testing Tool for Network Security
Commenti: Great penetration testing tool. A must know-how for any network security professional.
Aspetti positivi:
Nmap is the penetration testing tool of choice for Network Security Professionals. I used nmap for carrying various ethical hacking attacks on virtualized network systems to support teaching network security and cryptography university courses. nmap is so popular for carrying out DoS flooding attacks using TCP (Syn and Fin Flood attacks) and for port scanning and OS fingerprinting. The stealth scanning mode in nmap is so popular as well and it is very well implemented. Nmap is open source and many customization can be applied to make it more effective and personalized.
Aspetti negativi:
Nmap supports a command line interface with no GUI. This makes it a bit intimidating for beginners and undergraduate students. Although this is not a weakness, I believe that developing a standard GUI interface for nmap would be supporting a better reach to a larger customer base.
Best ever network scanning tool
Aspetti positivi:
The tool is very lightweight and simple to install. It is very accurate in detections and provides vulnerability information in a very clear manner that is easy to understand. Can detect open ports of applications and the status of firewall filtering applied for the ports. There are a lot of scripts available to conduct various types of detections. Scans can be conducted quickly. It supports both Windows and Linux platforms. In Linux, it is built into the operating system which is very helpful. This is the ultimate tool for map the network status.
Aspetti negativi:
Nmap GUI needs improvements. Updates are coming quite slowly. Technical knowledge is required to conduct advanced scans. Since this is an open-source tool there is a lack of support. You need to know the commands and required switches in order to conduct a scan. So for the users have a learning curve. Currently, the command line and Zenmap GUI are available. It s better if they can come up with a web-based interface with multi-user architecture.
Nmap Security Scanner for all
Commenti: Nmap is the best available Security scanner which scans for the open ports and gives us the banner and version information of the devices , Nmap is available in CLI (Command line Interface) and GUI (Graphical user interface) versions for technical and non technical users on various platforms.
Aspetti positivi:
Nmap can be easily customized as per the requirements of the users , we can define the IP ranges and the port numbers to be checked and also store them in the local filesystem storage for the further reference.
Aspetti negativi:
The Nmap generally give the false positives if we increase the no of threads to check the bigger network and we have to re verify the same by scanning smaller parts of the same network for proper results.
Nmap
Commenti: Highly satisfying and great tool once I learned how to use.
Aspetti positivi:
Nmap 7.90 has been released with Npcap 1.00 along with dozens of other performance improvements, bug fixes, and feature enhancements! A must have tool for anyone who works in cyber or networking industry. Developed over 20 years ago, Nmap is still one of top tools In Kali Linux, as well as top weapon to combat cyber terrorism worldwide.
Aspetti negativi:
Somewhat overwhelming and difficult to learn as a beginner, but as you practice implementing on terminal or command line. This really is amazing software and recommend to anyone in Cyber or IT industry.
Excellent tool for mapping and auditing and searching for vulnerabilities in networks
Commenti: It has allowed me to detect vulnerabilities in the network in a very fast and effective way. like the ports in use in real time and the type of traffic and protocols used by the applications in the company
Aspetti positivi:
* It's easy to use. * It's free. * Reliable with more than 17 years in the market. * It has extensive documentation and excellent support from the user community * Its latest version allows to perform pentesting tasks * It allows to audit the network to know its vulnerabilities: open ports, connected, wireless and wireless equipment. * Sneefer functions * It has multiple security tools that allow audits of passwords, scan the web, exploits, etc.
Aspetti negativi:
* It is an excellent work tool for professionals in the area of networks I do not find defects or negative aspects. only that I see it more for advanced users since it runs on linux operating systems and through the use of commands preferably.
open source tool that work fine
Commenti: There are multiple benefits that we obtain by implementing this software, especially as a network administrator, since we can quickly perform scans and store them for study; you can design different subnets and easily know which teams are recognized. I feel safe to use the software because it is kept up to date and its scripts work according to the use of new technologies.
Aspetti positivi:
The main advantage offered by this software is its ability to adapt to any operating system; especially in the area of network security since in the same infrastructure it will recognize open ports and many other functions without limits.
Aspetti negativi:
What I don't really like is that the software contains such powerful tools to carry out, for example, a port vulnerability scan, and then we can detect that unknown computers are using privileges and these results can be used to hack a network; so I don't know to what extent it is legal
Pentestor Review while port scanning
Commenti: The overall experience is great, I usually use Nmap when it comes to scanning for a white box pentest. Sometimes I use it for BlackBox as well in stealth mode and modified commands of course not the presets.
Aspetti positivi:
The most that I like it's easy to use, the GUI Nmap is really simple and straight forward. I have used the GUI in the begging and helped me a lot to work faster. And the profiling is even better.
Aspetti negativi:
It is the same as in the GUI and the command line the output is a bit too messy and difficult for the eye to follow. It's not a big deal since I know each section and what where to expect. It would be great if there was a better structure,
Excellent program of open code that serves to carry out tracking of ports in a computer
Commenti: highly recommended for people who want to know about hacking techniques
Aspetti positivi:
This program even in its graphic versions is very powerful, and has options to make scans very difficult to detect by victims or network supervisors. Scan any range of ports you want and even detect the victim's operating system, causing the hacker to identify more clearly how to access the remote computer
Aspetti negativi:
While it is more complex is the type of scan you want to perform, the scanning process can be slower and take several minutes before the end, the speed of the scan depends basically on 3 factors, speed of the scanner's computer (hacker) , latency in the network (if the network is slow or fast), and speed of response and security measures of the scanned computer (victim)
Nmap the good and the bad
Aspetti positivi:
Nmap is very easy to use, just issuing nmap scanme performs scans with default scannning. Also Nmap has an interesting feature that is off outpug xml with option -XO this makes it very easy to parse the result in other languages like python.
Aspetti negativi:
Some commands in Nmap require root access, for example performing some OS Detection and performing UDP port scanning.
Versatile open source software very important to find vulnerabilities
Aspetti positivi:
- Easy to use and very quick to use. - Very used in the laboratory practices to carry out the Audits or pentesting. - This tool has allowed students to learn to evaluate the security of the different computer systems.
Aspetti negativi:
- You must be aware of the update to try to avoid a failure. - When the scan is more complex it may take longer to do it.
The best port scanner ou there
Commenti: An excellent free and open source port scanner, with extended functionnality thanks to its NSE engine
Aspetti positivi:
Free and open source NSE engine is very powerful Does a lot more than just scanning Updates are frequent
Aspetti negativi:
The user interface (Zenmap) can be improved The number of NSE scripts is limited Generated reports are basic
The de facto network scanner
Commenti: The absolute goto network scanner
Aspetti positivi:
Nmap is loaded with tons of features and options, including a scripting language to add even more features as needed. Plus, it's very fast and efficient
Aspetti negativi:
Has a bit of a learning curve and technical knowledge about networks, and sometimes operating systems
The Standard Network Scanning Tool
Aspetti positivi:
I use Nmap very frequently for Information Security Consulting Services and Penetration Testing. It is an invaluable software tool for any information security professional. The level of detailed data you are able to obtain with it is unmatched to similar tools on the market.
Aspetti negativi:
Thre is nothing to complain about this tool, you can't go wrong with it. However, you do require some background technical knowledge and are required to do a lot of reading to understand how it works. You can use it for a long time and still not take advantage of its full potential.