problem installing nmap...

No explicit questions like "how do I hack xxx.com" please!
Post Reply
User avatar
moudy
Technology Enthusiast
Technology Enthusiast
Posts: 688
Joined: 10 Feb 2009, 17:00
15
Location: Beirut, Lebanon

problem installing nmap...

Post by moudy »

Hello every one, its been a while i haven't posted, been busy with exams, and dedicating some time for reading threads over here on the forums.

There is a problem I'm facing with installing nmap.
First of all i got the free version of nmap from http://nmap.org
The file i downloaded is: nmap-4.85BETA7-win32
This is a command line application as the website says, and works in win32 environment.

After unzipping, i come to install the application, after double clicking the icon i get this message:
The application has failed to start because its side-by-side configuration is incorrect. Please see the application event log for more detail.

Does any one have any idea what this could be ?
mahmoud_shihab@hotmail.com

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

hey moudy,
I haven't experienced that error message, lets see what everyone else writes..
I still use a Dos Prompt window to run Nmap, I don't use the GUI version.

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

ebrizzlez
Kage
Kage
Posts: 732
Joined: 31 Mar 2007, 16:00
17
Location: Hidden in a Buffer Protection.
Contact:

Post by ebrizzlez »

Make sure you have winpcap and its drivers installed along side with it or Nmap won't work properly on windows.

Also, try the Zenmap install, Zenmap is the GUI version of Nmap and is more easier to work around for beginners. 8)
[img]http://i81.photobucket.com/albums/j205/ebrizzlez/4lsint1.jpg[/img]

mystikblaze
Infinite Haze
Infinite Haze
Posts: 334
Joined: 11 Jun 2005, 16:00
18
Location: abroad
Contact:

Post by mystikblaze »

..
Last edited by mystikblaze on 21 Jun 2009, 08:25, edited 1 time in total.
Any fool can count the seeds in an apple. Only God can count all the apples in one seed. ~Robert H. Schuller
God is the greatest.

User avatar
moudy
Technology Enthusiast
Technology Enthusiast
Posts: 688
Joined: 10 Feb 2009, 17:00
15
Location: Beirut, Lebanon

Post by moudy »

ebrizzlez wrote:Make sure you have winpcap and its drivers installed along side with it or Nmap won't work properly on windows.
I have wireshark installed, so i assume winpcap is installed on my box...


mystikblaze wrote:you have to manually enter commands in CMD for the installation of nmap, read the instructions.
I searched alot for such instructions, but i didnt find any...
also the instructions on the applications's website are not sufficient...
so if u can provide with some tut to read, that would be great
Thanks all for the info...
mahmoud_shihab@hotmail.com

mystikblaze
Infinite Haze
Infinite Haze
Posts: 334
Joined: 11 Jun 2005, 16:00
18
Location: abroad
Contact:

Post by mystikblaze »

..
Last edited by mystikblaze on 21 Jun 2009, 08:25, edited 1 time in total.
Any fool can count the seeds in an apple. Only God can count all the apples in one seed. ~Robert H. Schuller
God is the greatest.

User avatar
moudy
Technology Enthusiast
Technology Enthusiast
Posts: 688
Joined: 10 Feb 2009, 17:00
15
Location: Beirut, Lebanon

Post by moudy »

Thanks a lot mystikblaze, i got this thing going (I assume :roll: ) this is what i got:

Code: Select all

Nmap 4.85BETA7 ( http://nmap.org )
Usage: nmap [Scan Type(s)] [Options] {target specification}
TARGET SPECIFICATION:
  Can pass hostnames, IP addresses, networks, etc.
  Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254
  -iL <inputfilename>: Input from list of hosts/networks
  -iR <num hosts>: Choose random targets
  --exclude <host1[,host2][,host3],...>: Exclude hosts/networks
  --excludefile <exclude_file>: Exclude list from file
HOST DISCOVERY:
  -sL: List Scan - simply list targets to scan
  -sP: Ping Scan - go no further than determining if host is online
  -PN: Treat all hosts as online -- skip host discovery
  -PS/PA/PU[portlist]: TCP SYN/ACK or UDP discovery to given ports
  -PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes
  -PO[protocol list]: IP Protocol Ping
  -n/-R: Never do DNS resolution/Always resolve [default: sometimes]
  --dns-servers <serv1[,serv2],...>: Specify custom DNS servers
  --system-dns: Use OS's DNS resolver
  --traceroute: Trace hop path to each host
SCAN TECHNIQUES:
  -sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans
  -sU: UDP Scan
  -sN/sF/sX: TCP Null, FIN, and Xmas scans
  --scanflags <flags>: Customize TCP scan flags
  -sI <zombie host[:probeport]>: Idle scan
  -sO: IP protocol scan
  -b <FTP relay host>: FTP bounce scan
PORT SPECIFICATION AND SCAN ORDER:
  -p <port ranges>: Only scan specified ports
    Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080
  -F: Fast mode - Scan fewer ports than the default scan
  -r: Scan ports consecutively - don't randomize
  --top-ports <number>: Scan <number> most common ports
  --port-ratio <ratio>: Scan ports more common than <ratio>
SERVICE/VERSION DETECTION:
  -sV: Probe open ports to determine service/version info
  --version-intensity <level>: Set from 0 (light) to 9 (try all probes)
  --version-light: Limit to most likely probes (intensity 2)
  --version-all: Try every single probe (intensity 9)
  --version-trace: Show detailed version scan activity (for debugging)
SCRIPT SCAN:
  -sC: equivalent to --script=default
  --script=<Lua scripts>: <Lua scripts> is a comma separated list of 
           directories, script-files or script-categories
  --script-args=<n1=v1,[n2=v2,...]>: provide arguments to scripts
  --script-trace: Show all data sent and received
  --script-updatedb: Update the script database.
OS DETECTION:
  -O: Enable OS detection
  --osscan-limit: Limit OS detection to promising targets
  --osscan-guess: Guess OS more aggressively
TIMING AND PERFORMANCE:
  Options which take <time> are in milliseconds, unless you append 's'
  (seconds), 'm' (minutes), or 'h' (hours) to the value (e.g. 30m).
  -T<0-5>: Set timing template (higher is faster)
  --min-hostgroup/max-hostgroup <size>: Parallel host scan group sizes
  --min-parallelism/max-parallelism <time>: Probe parallelization
  --min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout <time>: Specifies
      probe round trip time.
  --max-retries <tries>: Caps number of port scan probe retransmissions.
  --host-timeout <time>: Give up on target after this long
  --scan-delay/--max-scan-delay <time>: Adjust delay between probes
  --min-rate <number>: Send packets no slower than <number> per second
  --max-rate <number>: Send packets no faster than <number> per second
FIREWALL/IDS EVASION AND SPOOFING:
  -f; --mtu <val>: fragment packets (optionally w/given MTU)
  -D <decoy1,decoy2[,ME],...>: Cloak a scan with decoys
  -S <IP_Address>: Spoof source address
  -e <iface>: Use specified interface
  -g/--source-port <portnum>: Use given port number
  --data-length <num>: Append random data to sent packets
  --ip-options <options>: Send packets with specified ip options
  --ttl <val>: Set IP time-to-live field
  --spoof-mac <mac address/prefix/vendor name>: Spoof your MAC address
  --badsum: Send packets with a bogus TCP/UDP checksum
OUTPUT:
  -oN/-oX/-oS/-oG <file>: Output scan in normal, XML, s|<rIpt kIddi3,
     and Grepable format, respectively, to the given filename.
  -oA <basename>: Output in the three major formats at once
  -v: Increase verbosity level (use twice or more for greater effect)
  -d[level]: Set or increase debugging level (Up to 9 is meaningful)
  --reason: Display the reason a port is in a particular state
  --open: Only show open (or possibly open) ports
  --packet-trace: Show all packets sent and received
  --iflist: Print host interfaces and routes (for debugging)
  --log-errors: Log errors/warnings to the normal-format output file
  --append-output: Append to rather than clobber specified output files
  --resume <filename>: Resume an aborted scan
  --stylesheet <path/URL>: XSL stylesheet to transform XML output to HTML
  --webxml: Reference stylesheet from Nmap.Org for more portable XML
  --no-stylesheet: Prevent associating of XSL stylesheet w/XML output
MISC:
  -6: Enable IPv6 scanning
  -A: Enables OS detection and Version detection, Script scanning and Traceroute
  --datadir <dirname>: Specify custom Nmap data file location
  --send-eth/--send-ip: Send using raw ethernet frames or IP packets
  --privileged: Assume that the user is fully privileged
  --unprivileged: Assume the user lacks raw socket privileges
  -V: Print version number
  -h: Print this help summary page.
EXAMPLES:
  nmap -v -A scanme.nmap.org
  nmap -v -sP 192.168.0.0/16 10.0.0.0/8
  nmap -v -iR 10000 -PN -p 80
SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES
There was an application called vcredist_x86 (description:Microsoft Visual C++ 2008 Redistributable Setup) I installed it and followed ur instructions, and got this...
Thanks for the help
mahmoud_shihab@hotmail.com

mystikblaze
Infinite Haze
Infinite Haze
Posts: 334
Joined: 11 Jun 2005, 16:00
18
Location: abroad
Contact:

Post by mystikblaze »

..
Last edited by mystikblaze on 21 Jun 2009, 08:25, edited 1 time in total.
Any fool can count the seeds in an apple. Only God can count all the apples in one seed. ~Robert H. Schuller
God is the greatest.

User avatar
moudy
Technology Enthusiast
Technology Enthusiast
Posts: 688
Joined: 10 Feb 2009, 17:00
15
Location: Beirut, Lebanon

Post by moudy »

In the light of trying to understand exactly how nmap works, i passed over this image so i though i would share it with every one...
I don't know if this picture fits in this thread, or the admins would move it to another thread, I thought that since its about nmap it can go in this thread.

http://img17.imageshack.us/img17/6099/jpegj.jpg
killed the graphic until we can minimize it-DNR
mahmoud_shihab@hotmail.com

mystikblaze
Infinite Haze
Infinite Haze
Posts: 334
Joined: 11 Jun 2005, 16:00
18
Location: abroad
Contact:

Post by mystikblaze »

..
Last edited by mystikblaze on 21 Jun 2009, 08:29, edited 1 time in total.
Any fool can count the seeds in an apple. Only God can count all the apples in one seed. ~Robert H. Schuller
God is the greatest.

User avatar
moudy
Technology Enthusiast
Technology Enthusiast
Posts: 688
Joined: 10 Feb 2009, 17:00
15
Location: Beirut, Lebanon

Post by moudy »

yes sure mystikblaze, here is the link :lol:

http://nmap.org/docs/nmap-mindmap.pdf


But i was wondering, knowing that there is the GUI form of nmap...
What is better to use, the command line application or GUI ?
What are the pros and cons for both ?
I tried to search for this on google but results were varied, and not reliable, i want a professional's point of view on this...
thanks in advance
mahmoud_shihab@hotmail.com

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

moudy,

well don't think you have to rely on just nmap. I prefer the commandline app over the GUI (less problems!?) I got a folder in C:\nmap and I just run it off there. The Image of Nmap you provided is just a example of gathering nfo - creatiing a footprint of a computer or network.

But I use other tools, it is just not prudent to rely on one tool to do sensitive work for you. I call it sensitive, cuz if you screw up, something is not going to work! You always want to VERIFY your results with another tool.

In hacking, I consider nmap a tool for footprinting a network or computer, and there are other tools used in developing a 'map' of the computer/network of interest. Each tool either has its own way of performing the same task - say banner grabbing, the 'redundant' task is how you verify your results.

I could list all my tools, but my list of tools are somewhat personal - each hacker has his own tricks of his trade. Every member here will have his own list of tricks, none in theory, better than the other.

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
moudy
Technology Enthusiast
Technology Enthusiast
Posts: 688
Joined: 10 Feb 2009, 17:00
15
Location: Beirut, Lebanon

Post by moudy »

Thanks a lot for the info DNR
I'll keep on reading about the topic as long as i have time for it.
mahmoud_shihab@hotmail.com

Post Reply