DEV Community

Cover image for πŸ“‘ Diving into Nmap: Exploring Traffic with Wireshark
Matt
Matt

Posted on

πŸ“‘ Diving into Nmap: Exploring Traffic with Wireshark

Hey everyone πŸ‘‹

This is my first post here on dev.to! I'm currently taking a deep dive into Nmap, the powerful network scanning tool that so many security pros rely on. But instead of just reading results in the terminal, I wanted to go a step further…

πŸ’‘ I'm pairing Nmap with Wireshark to observe the actual packets being sent and received during different types of scans.

So far, I've been experimenting with:

  • SYN scans (-sS)
  • Connect scans (-sT)
  • OS detection (-O)
  • Ping sweeps (-sn)

By watching the network traffic in Wireshark while I run these commands, I’m learning a ton about how each scan behaves under the hood β€” what packets are sent, what responses come back, and how Nmap builds its results.

This hands-on combo has been super insightful for understanding how tools like Nmap interact with networks at a packet level.

I'll be sharing more stuff soon.

Cheers to learning by doing πŸ› οΈ
-Matt

Top comments (0)