Cybersecurity
From Zero to First Nmap Scan: My Intro to Ethical Hacking
A beginner-friendly walkthrough of my first Nmap network scan in a cybersecurity lab, plus what the results actually mean.
In my first cybersecurity lab, I used Kali Linux to run Nmap against a controlled target. It looked intimidating at first, but once I understood what a port, service, and version scan actually do, it became a lot less scary.
In this post, I cover:
-
Basic Nmap commands I started with
-
How to read the scan output without panicking
-
Why scanning your own lab environment is essential (and safe)
-
How this ties into bigger topics like vulnerability assessment
If you are new to ethical hacking, this is written from a student’s point of view using plain language.
Add comment
Comments