Nmap is the basis for all other scanners
April 14, 2021

Nmap is the basis for all other scanners

Greg Madden, CISSP | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Nmap

We use Nmap to do internal vulnerability testing and identifying holes in network security. The most common use case for me is to use Nmap to identify running services on devices to spot potential weaknesses in firewall rules or router rules. Many employees are familiar with Nmap and use it as well. It helps us identify problems quickly in new environments before we move to vulnerability scanning.
  • Nmap is great at finding live hosts on the network
  • Nmap is great for teaching new cyber specialist how network reconnaissance works
  • Nmap is built into every major recon tool on the market, it just works when it comes to scanning
  • There could be more built in tools for further vulnerability scanning
  • command line Nmap should store recent scans automatically
  • More detail in the help menu for what some of the triggers actually do
  • Subnet scans
  • Zenmaps GUI
  • Simplicity of command structure
  • Drastically sped up network discovery
  • Decreased initial target acquisition time in pen testing
  • Identified issues within our own environment with open ports
Nmap is the basis for all of its competitors. They all have Nmap built in and before you ever move beyond it, you have to understand it

Do you think Nmap delivers good value for the price?

Yes

Are you happy with Nmap's feature set?

Yes

Did Nmap live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Nmap go as expected?

Yes

Would you buy Nmap again?

Yes

One of Nmaps strongest skills is the ability to gather initial evidence about networks to begin narrowing down target windows. Nmap can scan entire subnets and find only live hosts and then more intensively scan the live hosts to help identify which ones have the most vulnerable services or open ports. It is not suited for actual exploitation, just the initial steps

Nmap Feature Ratings

Automated network device discovery
10
Network monitoring
10
Baseline threshold calculation
10
Network mapping
10
Customizable reports
5
Wireless infrastructure monitoring
10
Hardware health monitoring
6