Nmap is a powerfull well known program for network scanning. Please refer to nmap.org for full documentation
This project is a Python implementation of Nmap's OS fingerprinting functionality. It is designed for educational purposes to help you understand how Nmap's OS fingerprinting works and how to use it in your own projects.
Before you begin, ensure you have met the following requirements:
- Python 3.9 or higher
- Scapy library for Python (used for packet analysis)
- PyInstaller (for creating standalone executables)
Follow these steps to set up and run the Nmap OS fingerprinting tool:
-
Clone the repository:
git clone https://github.com/yourusername/nmap-os-fingerprinting.git cd nmap-os-fingerprinting
-
Install requirments:
Install python version 3.9 or higher
pip install -r requirements.txt
-
Install program:
Linux:
./install.sh
If you want to specify a custom installation directory, you can use the -d or --dir option followed by the desired directory path:
./install.sh -d /path/to/custom_directory
- destination_ip: The IP address of the destination host
- -h, --help: Show this help message and exit
- -o OPEN_PORT, --open-port OPEN_PORT: Specify the open port to scan
- -c CLOSED_PORT, --closed-port CLOSED_PORT: Specify the closed port to scan
- -f OUTPUT_FILE, --output-file OUTPUT_FILE: Specify the output file to write results
- -m MATCH_OS, --match-os MATCH_OS: Specify the number of operating systems to match (default: 3)