Skip to content

A comprehensive guide & hands-on learning journey designed to take you from absolute beginner to network security expert using Nmap

Notifications You must be signed in to change notification settings

hack4bug/30Days-Nmap

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

30 Days of Nmap – Master Network Security & Ethical Hacking | Hack4Bug Hack4Bug Logo Hack4Bug Logo

Nmap Logo

GitHub Stars GitHub Forks GitHub Issues License

Overview

30 Days of Nmap is a comprehensive, hands-on learning journey designed to take you from absolute beginner to network security expert using Nmap - the world's most powerful network scanner. This structured 30-day curriculum covers everything from basic port scanning to advanced evasion techniques, making it perfect for cybersecurity enthusiasts, ethical hackers, network administrators, and penetration testers.

What You'll Learn

Hack4Bug-Academy/
│
├── Day01-Introduction-to-Nmap/
├── Day02-Nmap-Installation-and-Setup/
├── Day03-Understanding-Ports-and-Protocols/
├── Day04-Basic-Host-Discovery/
├── Day05-Basic-Port-Scanning/
├── Day06-TCP-Scan-Techniques-SYN-and-Connect/
├── Day07-UDP-Scanning/
├── Day08-Service-and-Version-Detection/
├── Day09-OS-Fingerprinting/
├── Day10-Timing-and-Performance-Options/
│
├── Day11-Nmap-Scripting-Engine-Basics/
├── Day12-NSE-Discovery-Scripts/
├── Day13-NSE-Vulnerability-Scripts/
├── Day14-Bruteforce-and-Authentication-Scripts/
├── Day15-Custom-NSE-Scripts-Overview/
│
├── Day16-Output-Formats-and-Reporting/
├── Day17-Grepable-and-XML-Parsing/
├── Day18-Nmap-Automation-with-Shell-Scripts/
├── Day19-Multiple-Targets-and-IP-Ranges/
├── Day20-Stealth-and-Evasion-Techniques/
│
├── Day21-Firewall-and-IDS-Evasion/
├── Day22-Spoofing-and-Decoy-Scanning/
├── Day23-Fragmentation-and-Packet-Manipulation/
├── Day24-Web-Server-Scanning-with-Nmap/
├── Day25-Database-and-SMB-Enumeration/
│
├── Day26-Cloud-and-External-Perimeter-Scanning/
├── Day27-Internal-Network-Enumeration/
├── Day28-Real-World-Reconnaissance-Methodology/
├── Day29-Full-Nmap-Recon-Workflow/
└── Day30-Final-Practical-Challenge/

Core Nmap Fundamentals (Days 1-10)

  • Network Discovery & Scanning: Master host discovery, port scanning techniques, and service enumeration
  • Protocol Expertise: Deep dive into TCP, UDP, and various network protocols
  • Advanced Detection: Learn OS fingerprinting, version detection, and timing optimization

Nmap Scripting Engine (Days 11-15)

  • Automated Security Testing: Harness the power of NSE (Nmap Scripting Engine)
  • Vulnerability Assessment: Use built-in scripts for security auditing
  • Custom Scripting: Learn to write and modify NSE scripts for specific tasks

Professional Workflows (Days 16-20)

  • Reporting & Automation: Generate comprehensive reports in multiple formats
  • Large-Scale Scanning: Techniques for scanning networks and IP ranges efficiently
  • Output Management: Parse and analyze scan results like a professional

Advanced Security Techniques (Days 21-30)

  • Stealth & Evasion: Bypass firewalls, IDS/IPS systems, and detection mechanisms
  • Targeted Enumeration: Specialized scanning for web servers, databases, and SMB services
  • Real-World Reconnaissance: Build complete security assessment workflows
  • Cloud & Network Security: Techniques for modern infrastructure scanning

Getting Started

Prerequisites

  • Basic understanding of networking concepts
  • Linux/Unix command line familiarity
  • Nmap installed on your system
  • Ethical testing environment (own network/lab)

Quick Start

# Clone the repository
git clone https://github.com/hack4bug/30Days-Nmap.git

# Navigate to the project
cd 30Days-Nmap

# Start with Day 01
cd Day01-Introduction-to-Nmap 

Who Is This For?

  • Cybersecurity Beginners - Start your ethical hacking journey with structured, hands-on learning
  • Network Administrators - Enhance your security auditing skills and protect your infrastructure
  • Penetration Testers - Master reconnaissance techniques and expand your toolset
  • IT Professionals - Understand network vulnerabilities and improve security posture
  • Students & Certification Seekers - Prepare for CEH, Pentest+, Security+, and other cybersecurity certifications
  • Security Enthusiasts - Anyone passionate about network security and ethical hacking
  • System Administrators - Learn to audit and secure servers and network devices
  • DevSecOps Engineers - Integrate security scanning into development pipelines
  • Bug Bounty Hunters - Improve reconnaissance skills for finding security vulnerabilities
  • Red & Blue Team Members - Enhance both offensive and defensive security capabilities

Getting Started

Prerequisites

  • Basic understanding of networking concepts
  • Linux/Unix command line familiarity
  • Nmap installed on your system
  • Ethical testing environment (own network/lab)

Key Features

  • Structured 30-Day Learning Path - Progress systematically from basics to advanced techniques
  • Hands-On Practical Exercises - Real-world scanning scenarios and challenges
  • Comprehensive Coverage - Explore all Nmap features and capabilities
  • Professional Techniques - Industry-standard security assessment methods
  • Open Source & Free - Complete access to all materials and resources
  • Community Supported - Regularly updated with contributions from security experts
  • Practical Challenges - Apply your knowledge with real-world scenarios

Technology Stack

  • Primary Tool: Nmap (Network Mapper)
  • Scripting: NSE (Nmap Scripting Engine) with Lua
  • Supporting Tools: Various networking and security utilities
  • Platforms: Cross-platform (Windows, Linux, macOS)

Learning Outcomes

By completing this 30-day challenge, you will be able to:

  1. Perform comprehensive network reconnaissance and asset discovery
  2. Identify open ports and services on target systems with precision
  3. Detect operating systems and software versions accurately
  4. Discover security vulnerabilities using automated scripts and manual techniques
  5. Evade security systems during authorized penetration tests
  6. Generate professional security assessment reports for stakeholders
  7. Automate scanning workflows for efficiency in large environments
  8. Conduct ethical security audits following industry best practices
  9. Customize scanning approaches for different target types and environments
  10. Integrate Nmap into larger security workflows and toolchains

Project Structure

The repository follows a logical progression across 30 days, each focusing on specific Nmap capabilities:

Weeks 1-2: Foundation building with basic scanning techniques
Weeks 3-4: Advanced features and automation with NSE
Weeks 5-6: Professional workflows and evasion techniques
Final Week: Real-world application and comprehensive challenges

Each day contains practical exercises, examples, and documentation to reinforce learning.

Contributing

We welcome contributions from the security community! Whether you're fixing typos, adding new exercises, improving documentation, or translating content, your help makes this resource better for everyone.

  1. Fork the repository to your GitHub account
  2. Create a new branch for your changes
  3. Make your improvements or additions
  4. Test your changes thoroughly
  5. Submit a pull request with a clear description of your changes

Please read our contributing guidelines for more details on our code of conduct and submission process.

Legal & Ethical Disclaimer

IMPORTANT: This repository is for EDUCATIONAL PURPOSES AND AUTHORIZED TESTING ONLY.

  • Only scan networks you own or have explicit written permission to test
  • Unauthorized scanning is illegal, unethical, and may result in legal consequences
  • The authors and contributors are not responsible for any misuse of this information
  • Always comply with local laws, regulations, and organizational policies
  • Use these skills to improve security defenses, not to compromise them
  • Respect privacy and obtain proper authorization before any security testing
  • Follow responsible disclosure practices when vulnerabilities are discovered

License

This project is licensed under the MIT License - see the LICENSE file for details.

Acknowledgments

  • Nmap Development Team for creating an amazing tool
  • Cybersecurity community for continuous knowledge sharing
  • All contributors who help improve this learning resource
  • Open source community for maintaining and improving security tools

Support the Project

If you find this resource helpful:

  • Star the repository to show your support
  • Watch for updates and new content
  • Report issues and suggest improvements
  • Share with your network and colleagues

Connect & Community

Have questions or want to connect?

  • GitHub Issues - For technical questions and bug reports
  • GitHub Discussions - For community discussions and support
  • Contribute - Help make this resource better for everyone

Start your journey today and master network security with Nmap in just 30 days!

"The quieter you become, the more you are able to hear." - UNIX Philosophy

About

A comprehensive guide & hands-on learning journey designed to take you from absolute beginner to network security expert using Nmap

Topics

Resources

Stars

Watchers

Forks

Languages