Geekflare is supported by our audience. We may earn affiliate commissions from buying links on this site.
Share on:

How to Install NMAP on Windows with Real-time Usage Examples?

Invicti Web Application Security Scanner – the only solution that delivers automatic verification of vulnerabilities with Proof-Based Scanning™.

NMAP (Network Mapper), is one of the famous open-source tools to perform network scans, security auditing, and find vulnerabilities in network infrastructure.

One of the popular know usages of NMAP is to find the open ports in the network. NMAP can be installed on Windows, Linux, macOS, and much more.

In this quick guide, I will explain how to get NMAP installed on Windows OS & some usage examples.

Installing NMAP


or, use the direct link here to download 

  • Go to the location where the file is downloaded
  • Right-click on the EXE file and click “Run as administrator.”
  • It will start the installation process, accept the license agreement
  • You can choose what components to install, but it would be good to install all of them
  • By default, it will install under C:Program Files (x86)Nmap but feel free to change if needed
  • It will start installing NMAP and once done; you will get confirmation
  • This concludes NMAP is successfully installed.

Go ahead and play around with the tool to get an idea of how it works. Here are some examples.

Detecting the version

One of the wide uses for NMAP is to fingerprint the OS and running technologies.

nmap -sV $target

-sV command argument will detect the versions & state of running services

Checking certificate information

OpenSSL is mostly used to perform certificate operations like generation, verification, modification, etc. However, you can do certain things with NMAP as well.

nmap -p $port --script ssl-cert.nse $target

In case you are wondering, ssl-cert.nse the script gets installed along with NMAP. It’s available under the default location C:Program Files x86)Nmapscripts

Checking cipher information

ssl-enum-cihpers.nse script can be used to validate the SSL cipher information.

nmap -p $port --script ssl-enum-ciphers.nse $target

Each cipher suite is shown with a letter grade (A through F) indicating the strength of the connection. The grade is based on the cryptographic strength of the key exchange and of the stream cipher.

The message integrity (hash) algorithm choice is not a factor. The output line beginning with the least strength shows the strength of the weakest cipher offered.

To detect DH (Diffie-Hellman) vulnerability, you can use the below syntax.

nmap -p $port --script ssl-dh-params.nse $target

I hope this quick instruction helps you to install and get familiar with NMAP on Windows operating system.

If you are looking to master how to use NMAP then check out this online course by Jimmy Larsson.

Thanks to our Sponsors
More great readings on Windows
Power Your Business
Some of the tools and services to help your business grow.
  • Invicti uses the Proof-Based Scanning™ to automatically verify the identified vulnerabilities and generate actionable results within just hours.
    Try Invicti
  • Web scraping, residential proxy, proxy manager, web unlocker, search engine crawler, and all you need to collect web data.
    Try Brightdata
  • Semrush is an all-in-one digital marketing solution with more than 50 tools in SEO, social media, and content marketing.
    Try Semrush
  • Intruder is an online vulnerability scanner that finds cyber security weaknesses in your infrastructure, to avoid costly data breaches.
    Try Intruder