{"id":1314,"date":"2025-02-05T07:36:32","date_gmt":"2025-02-05T03:36:32","guid":{"rendered":"https:\/\/www.buildingtheitguy.com\/?p=1314"},"modified":"2025-02-05T07:36:33","modified_gmt":"2025-02-05T03:36:33","slug":"nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition","status":"publish","type":"post","link":"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/","title":{"rendered":"Nmap Network Scanning: A Hands-On Cybersecurity Lab (2025 Edition)"},"content":{"rendered":"\n<p><a href=\"https:\/\/nmap.org\/\">Nmap <\/a>(<strong>Network Mapper<\/strong>) is a must-have tool for anyone interested in <strong>cybersecurity, ethical hacking, or network administration<\/strong>. It helps you <strong>scan networks, find active devices, detect open ports, and gather information about running services<\/strong>.<\/p>\n\n\n\n<p>For <strong>beginners<\/strong>, Nmap is a great way to understand how networks work and how attackers find security weaknesses. For <strong>intermediate students<\/strong>, it provides advanced scanning techniques like <strong>OS detection, service enumeration, and vulnerability scanning<\/strong>.<\/p>\n\n\n<div class=\"wp-block-ub-table-of-contents-block ub_table-of-contents\" id=\"ub_table-of-contents-e2e2f888-4028-4f62-acd2-9598f62df5cd\" data-linktodivider=\"false\" data-showtext=\"show\" data-hidetext=\"hide\" data-scrolltype=\"auto\" data-enablesmoothscroll=\"false\" data-initiallyhideonmobile=\"false\" data-initiallyshow=\"true\"><div class=\"ub_table-of-contents-header-container\" style=\"\">\n\t\t\t<div class=\"ub_table-of-contents-header\" style=\"text-align: left; \">\n\t\t\t\t<div class=\"ub_table-of-contents-title\" style=\"\"><\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t<\/div><div class=\"ub_table-of-contents-extra-container\" style=\"\">\n\t\t\t<div class=\"ub_table-of-contents-container ub_table-of-contents-1-column \">\n\t\t\t\t<ul style=\"\"><li style=\"\"><a href=\"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/#0-lab-setup\" style=\"\">Lab Setup<\/a><\/li><li style=\"\"><a href=\"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/#1-lab-exercise-guided-nmap-scanning-\" style=\"\">Lab Exercise: Guided Nmap Scanning<\/a><ul><li style=\"\"><a href=\"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/#2-step-1-basic-nmap-scan\" style=\"\">Step 1: Basic Nmap Scan<\/a><\/li><li style=\"\"><a href=\"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/#3-step-2-port-scanning\" style=\"\">Step 2: Port Scanning<\/a><\/li><li style=\"\"><a href=\"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/#4-step-3-service-version-detection\" style=\"\">Step 3: Service Version Detection<\/a><\/li><li style=\"\"><a href=\"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/#5-step-4-operating-system-detection\" style=\"\">Step 4: Operating System Detection<\/a><\/li><li style=\"\"><a href=\"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/#6-step-5-aggressive-scan\" style=\"\">Step 5: Aggressive Scan<\/a><\/li><li style=\"\"><a href=\"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/#7-step-6-nmap-scripting-engine-nse\" style=\"\">Step 6: Nmap Scripting Engine (NSE)<\/a><\/li><li style=\"\"><a href=\"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/#8-step-7-save-scan-results\" style=\"\">Step 7: Save Scan Results<\/a><\/li><li style=\"\"><a href=\"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/#9-additional-challenges\" style=\"\">Additional Challenges<\/a><\/li><li style=\"\"><a href=\"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/#10-end-of-this-learning\" style=\"\">End of this Learning<\/a><\/li><\/ul><\/li><\/ul>\n\t\t\t<\/div>\n\t\t<\/div><\/div>\n\n\n<p class=\"has-text-align-center\"> Learn how to use Nmap for<br>\u2022 Network discovery.<br>\u2022 Port scanning.<br>\u2022 Service detection.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"0-lab-setup\">Lab Setup<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Prerequisites:<\/strong><br>o VirtualBox installed with Kali Linux running.<br>o Ensure the Kali Linux VM has internet access.<br>o A second VM (e.g., Metasploitable or another vulnerable VM) to act as the target machine.<\/li>\n\n\n\n<li><strong>Target VM:<\/strong><br>o Use Metasploitable 2 as the target machine. This VM is intentionally vulnerable and perfect for practicing Nmap scans.<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"1-lab-exercise-guided-nmap-scanning-\"><strong>Lab Exercise: Guided Nmap Scanning<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"2-step-1-basic-nmap-scan\"><br>Step 1: Basic Nmap Scan<\/h3>\n\n\n\n<p><br><strong>Objective<\/strong>: Perform a basic scan to discover live hosts on the network.<br>Command:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: bash; title: ; notranslate\" title=\"\">\nnmap -sP 192.168.1.0\/24\n<\/pre><\/div>\n\n\n<p><strong>Explanation:<\/strong><br>-sP: Ping scan to discover live hosts.<br>192.168.1.0\/24: Scans the entire subnet for live hosts.<br>\u2022 <strong>Task<\/strong>:<br>Identify the IP address of the target VM (Metasploitable).<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"3-step-2-port-scanning\">Step 2: Port Scanning<\/h3>\n\n\n\n<p><br><strong>Objective<\/strong>: Scan the target machine to identify open ports.<br>Command:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; title: ; notranslate\" title=\"\">\nnmap -p- 192.168.1.10\n<\/pre><\/div>\n\n\n<p><strong>Explanation<\/strong>:<br>-p-: Scans all 65,535 ports.<br>192.168.1.10: Replace with the target VM&#8217;s IP address.<br><strong>Task<\/strong>:<br>List all open ports on the target machine.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"4-step-3-service-version-detection\">Step 3: Service Version Detection<\/h3>\n\n\n\n<p><br><strong>Objective<\/strong>: Identify the services running on open ports and their versions.<br>Command:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; title: ; notranslate\" title=\"\">\nnmap -sV 192.168.1.10\n<\/pre><\/div>\n\n\n<p><strong>Explanation<\/strong>:<br>-sV: Enables version detection.<br><strong>Task<\/strong>:<br>Identify the service name and version for each open port.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"5-step-4-operating-system-detection\">Step 4: Operating System Detection<\/h3>\n\n\n\n<p><br><strong>Objective<\/strong>: Determine the operating system of the target machine.<br>Command:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; title: ; notranslate\" title=\"\">\nnmap -O 192.168.1.10\n<\/pre><\/div>\n\n\n<p><strong>Explanation<\/strong>:<br>-O: Enables OS detection.<br><strong>Task<\/strong>:<br>Identify the operating system of the target machine.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"6-step-5-aggressive-scan\">Step 5: Aggressive Scan<\/h3>\n\n\n\n<p><br><strong>Objective<\/strong>: Perform an aggressive scan to gather detailed information.<br>Command:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; title: ; notranslate\" title=\"\">\nnmap -A 192.168.1.10\n<\/pre><\/div>\n\n\n<p><strong>Explanation<\/strong>:<br>-A: Enables OS detection, version detection, script scanning, and traceroute.<br>Task:<br>Analyze the output and note down the details.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"7-step-6-nmap-scripting-engine-nse\">Step 6: Nmap Scripting Engine (NSE)<\/h3>\n\n\n\n<p><br><strong>Objective<\/strong>: Use Nmap scripts to gather additional information.<br>Command:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; title: ; notranslate\" title=\"\">\nnmap --script vuln 192.168.1.10\n<\/pre><\/div>\n\n\n<p><strong>Explanation<\/strong>:<br>&#8211;script vuln: Runs vulnerability detection scripts.<br><strong>Task<\/strong>:<br>Identify any vulnerabilities on the target machine.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"8-step-7-save-scan-results\">Step 7: Save Scan Results<\/h3>\n\n\n\n<p><br><strong>Objective<\/strong>: Save the scan results for later analysis.<br>Command:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; title: ; notranslate\" title=\"\">\nnmap -oN scan_results.txt 192.168.1.10\n<\/pre><\/div>\n\n\n<p><strong>Explanation<\/strong>:<br>-oN: Saves the output to a text file.<br>\u2022 Task:<br>Open scan_results.txt and review the findings.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"9-additional-challenges\">Additional Challenges<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Scan a Specific Port Range:<br>Scan only ports 1-1000 on the target machine.<br><strong><em>nmap -p 1-1000 192.168.1.10<\/em><\/strong><\/li>\n\n\n\n<li>UDP Scan:<br>Perform a UDP scan to identify open UDP ports.<br><strong><em>nmap -sU 192.168.1.10<\/em><\/strong><\/li>\n\n\n\n<li>Timing and Stealth:<br>Use timing templates to control the speed of the scan.<br><strong><em>nmap -T4 192.168.1.10<\/em><\/strong> (T4 is faster, T1 is slower and stealthier).<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"10-end-of-this-learning\">End of this Learning<\/h3>\n\n\n\n<p>A summary of the findings,<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Open ports<\/li>\n\n\n\n<li>Services<\/li>\n\n\n\n<li>OS<\/li>\n\n\n\n<li>Vulnerabilities<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Nmap (Network Mapper) is a must-have tool for anyone interested in cybersecurity, ethical hacking, or network administration. It helps you scan networks, find active devices, detect open ports, and gather information about running services. For beginners, Nmap is a great way to understand how networks work and how attackers find security weaknesses. For intermediate students, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1323,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33],"tags":[140,141,138,133,137,130,37,134,131,135,136,132,139],"class_list":["post-1314","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-bugbounty","tag-ctfchallenges","tag-cybersecurityforbeginners","tag-cybersecuritytraining","tag-ethicalhacker","tag-ethicalhacking","tag-infosec","tag-kalilinux","tag-networkscanning","tag-networksecurity","tag-nmaptutorial","tag-penetrationtesting","tag-redteam"],"featured_image_src":"https:\/\/www.buildingtheitguy.com\/wp-content\/uploads\/2025\/02\/nmap.png","author_info":{"display_name":"Mohamed Asath","author_link":"https:\/\/www.buildingtheitguy.com\/index.php\/author\/asathwebtieradmin\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Nmap Network Scanning: A Hands-On Cybersecurity Lab (2025 Edition) - Building THE IT GUY<\/title>\n<meta name=\"description\" content=\"Learn Nmap from scratch! This hands-on cybersecurity lab guide (2025) teaches beginners and intermediate students how to scan networks, detect open ports, and enumerate services using Nmap. Master ethical hacking and network security with real-world examples!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nmap Network Scanning: A Hands-On Cybersecurity Lab (2025 Edition) - Building THE IT GUY\" \/>\n<meta property=\"og:description\" content=\"Learn Nmap from scratch! This hands-on cybersecurity lab guide (2025) teaches beginners and intermediate students how to scan networks, detect open ports, and enumerate services using Nmap. Master ethical hacking and network security with real-world examples!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Building THE IT GUY\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-05T03:36:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-05T03:36:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.buildingtheitguy.com\/wp-content\/uploads\/2025\/02\/nmap.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mohamed Asath\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mohamed Asath\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/index.php\\\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\\\/cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/index.php\\\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\\\/cybersecurity\\\/\"},\"author\":{\"name\":\"Mohamed Asath\",\"@id\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/#\\\/schema\\\/person\\\/cce03fcda4c40ccf57ab3844ca707561\"},\"headline\":\"Nmap Network Scanning: A Hands-On Cybersecurity Lab (2025 Edition)\",\"datePublished\":\"2025-02-05T03:36:32+00:00\",\"dateModified\":\"2025-02-05T03:36:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/index.php\\\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\\\/cybersecurity\\\/\"},\"wordCount\":446,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/index.php\\\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\\\/cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/nmap.png\",\"keywords\":[\"BugBounty\",\"CTFChallenges\",\"CybersecurityForBeginners\",\"CybersecurityTraining\",\"EthicalHacker\",\"EthicalHacking\",\"infosec\",\"KaliLinux\",\"NetworkScanning\",\"NetworkSecurity\",\"NmapTutorial\",\"PenetrationTesting\",\"RedTeam\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.buildingtheitguy.com\\\/index.php\\\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\\\/cybersecurity\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/index.php\\\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\\\/cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/index.php\\\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\\\/cybersecurity\\\/\",\"name\":\"Nmap Network Scanning: A Hands-On Cybersecurity Lab (2025 Edition) - Building THE IT GUY\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/index.php\\\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\\\/cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/index.php\\\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\\\/cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/nmap.png\",\"datePublished\":\"2025-02-05T03:36:32+00:00\",\"dateModified\":\"2025-02-05T03:36:33+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/#\\\/schema\\\/person\\\/cce03fcda4c40ccf57ab3844ca707561\"},\"description\":\"Learn Nmap from scratch! This hands-on cybersecurity lab guide (2025) teaches beginners and intermediate students how to scan networks, detect open ports, and enumerate services using Nmap. Master ethical hacking and network security with real-world examples!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/index.php\\\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\\\/cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.buildingtheitguy.com\\\/index.php\\\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\\\/cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/index.php\\\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\\\/cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/nmap.png\",\"contentUrl\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/nmap.png\",\"width\":1200,\"height\":628,\"caption\":\"Nmap Network Scanning: A Hands-On Cybersecurity Lab (2025 Edition)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/index.php\\\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\\\/cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nmap Network Scanning: A Hands-On Cybersecurity Lab (2025 Edition)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/#website\",\"url\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/\",\"name\":\"Building THE IT GUY\",\"description\":\"Making Everyone&#039;s Life Easier\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/#\\\/schema\\\/person\\\/cce03fcda4c40ccf57ab3844ca707561\",\"name\":\"Mohamed Asath\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ab17cc6285a5051affe4181f53011c89cc055de9416bcc44b3e2771be318d870?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ab17cc6285a5051affe4181f53011c89cc055de9416bcc44b3e2771be318d870?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ab17cc6285a5051affe4181f53011c89cc055de9416bcc44b3e2771be318d870?s=96&r=g\",\"caption\":\"Mohamed Asath\"},\"description\":\"Turning IT Challenges into Opportunities\",\"sameAs\":[\"https:\\\/\\\/www.buildingtheitguy.com\"],\"url\":\"https:\\\/\\\/www.buildingtheitguy.com\\\/index.php\\\/author\\\/asathwebtieradmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nmap Network Scanning: A Hands-On Cybersecurity Lab (2025 Edition) - Building THE IT GUY","description":"Learn Nmap from scratch! This hands-on cybersecurity lab guide (2025) teaches beginners and intermediate students how to scan networks, detect open ports, and enumerate services using Nmap. Master ethical hacking and network security with real-world examples!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Nmap Network Scanning: A Hands-On Cybersecurity Lab (2025 Edition) - Building THE IT GUY","og_description":"Learn Nmap from scratch! This hands-on cybersecurity lab guide (2025) teaches beginners and intermediate students how to scan networks, detect open ports, and enumerate services using Nmap. Master ethical hacking and network security with real-world examples!","og_url":"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/","og_site_name":"Building THE IT GUY","article_published_time":"2025-02-05T03:36:32+00:00","article_modified_time":"2025-02-05T03:36:33+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.buildingtheitguy.com\/wp-content\/uploads\/2025\/02\/nmap.png","type":"image\/png"}],"author":"Mohamed Asath","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mohamed Asath","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/"},"author":{"name":"Mohamed Asath","@id":"https:\/\/www.buildingtheitguy.com\/#\/schema\/person\/cce03fcda4c40ccf57ab3844ca707561"},"headline":"Nmap Network Scanning: A Hands-On Cybersecurity Lab (2025 Edition)","datePublished":"2025-02-05T03:36:32+00:00","dateModified":"2025-02-05T03:36:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/"},"wordCount":446,"commentCount":0,"image":{"@id":"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.buildingtheitguy.com\/wp-content\/uploads\/2025\/02\/nmap.png","keywords":["BugBounty","CTFChallenges","CybersecurityForBeginners","CybersecurityTraining","EthicalHacker","EthicalHacking","infosec","KaliLinux","NetworkScanning","NetworkSecurity","NmapTutorial","PenetrationTesting","RedTeam"],"articleSection":["Cyber Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/","url":"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/","name":"Nmap Network Scanning: A Hands-On Cybersecurity Lab (2025 Edition) - Building THE IT GUY","isPartOf":{"@id":"https:\/\/www.buildingtheitguy.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.buildingtheitguy.com\/wp-content\/uploads\/2025\/02\/nmap.png","datePublished":"2025-02-05T03:36:32+00:00","dateModified":"2025-02-05T03:36:33+00:00","author":{"@id":"https:\/\/www.buildingtheitguy.com\/#\/schema\/person\/cce03fcda4c40ccf57ab3844ca707561"},"description":"Learn Nmap from scratch! This hands-on cybersecurity lab guide (2025) teaches beginners and intermediate students how to scan networks, detect open ports, and enumerate services using Nmap. Master ethical hacking and network security with real-world examples!","breadcrumb":{"@id":"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/#primaryimage","url":"https:\/\/www.buildingtheitguy.com\/wp-content\/uploads\/2025\/02\/nmap.png","contentUrl":"https:\/\/www.buildingtheitguy.com\/wp-content\/uploads\/2025\/02\/nmap.png","width":1200,"height":628,"caption":"Nmap Network Scanning: A Hands-On Cybersecurity Lab (2025 Edition)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.buildingtheitguy.com\/index.php\/nmap-network-scanning-a-hands-on-cybersecurity-lab-2025-edition\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.buildingtheitguy.com\/"},{"@type":"ListItem","position":2,"name":"Nmap Network Scanning: A Hands-On Cybersecurity Lab (2025 Edition)"}]},{"@type":"WebSite","@id":"https:\/\/www.buildingtheitguy.com\/#website","url":"https:\/\/www.buildingtheitguy.com\/","name":"Building THE IT GUY","description":"Making Everyone&#039;s Life Easier","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.buildingtheitguy.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.buildingtheitguy.com\/#\/schema\/person\/cce03fcda4c40ccf57ab3844ca707561","name":"Mohamed Asath","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ab17cc6285a5051affe4181f53011c89cc055de9416bcc44b3e2771be318d870?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ab17cc6285a5051affe4181f53011c89cc055de9416bcc44b3e2771be318d870?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ab17cc6285a5051affe4181f53011c89cc055de9416bcc44b3e2771be318d870?s=96&r=g","caption":"Mohamed Asath"},"description":"Turning IT Challenges into Opportunities","sameAs":["https:\/\/www.buildingtheitguy.com"],"url":"https:\/\/www.buildingtheitguy.com\/index.php\/author\/asathwebtieradmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.buildingtheitguy.com\/index.php\/wp-json\/wp\/v2\/posts\/1314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.buildingtheitguy.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.buildingtheitguy.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.buildingtheitguy.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.buildingtheitguy.com\/index.php\/wp-json\/wp\/v2\/comments?post=1314"}],"version-history":[{"count":8,"href":"https:\/\/www.buildingtheitguy.com\/index.php\/wp-json\/wp\/v2\/posts\/1314\/revisions"}],"predecessor-version":[{"id":1322,"href":"https:\/\/www.buildingtheitguy.com\/index.php\/wp-json\/wp\/v2\/posts\/1314\/revisions\/1322"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.buildingtheitguy.com\/index.php\/wp-json\/wp\/v2\/media\/1323"}],"wp:attachment":[{"href":"https:\/\/www.buildingtheitguy.com\/index.php\/wp-json\/wp\/v2\/media?parent=1314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.buildingtheitguy.com\/index.php\/wp-json\/wp\/v2\/categories?post=1314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.buildingtheitguy.com\/index.php\/wp-json\/wp\/v2\/tags?post=1314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}