![]() |
| How to Use Nmap on Windows |
When people think of Nmap, they usually picture Linux terminals and hardcore hackers in black hoodies. But here’s truth you can run Nmap perfectly fine on Windows, and it’s just as powerful. Whether you’re a cybersecurity student, a system admin, or simply a curious techie, mastering Nmap is like getting your first real tool in ethical hacking world.
So, if you’ve ever wondered how to use Nmap on Windows, this guide will walk you through everything from downloading and installing it to running your very first scan.
Download and Install Nmap on Windows
Let’s start simple.
Go to official Nmap website (nmap.org).
-
Head over to Downloads section and grab Windows installer it’s a
.exefile that contains everything you need, including GUI version called Zenmap if you prefer a visual interface. -
Once downloaded, double-click installer and follow installation wizard.
-
Make sure to check box that says “Add Nmap to PATH” this allows you to run Nmap directly from Command Prompt or PowerShell.
Test Installation
Now, let’s make sure Nmap works properly.
Open Command Prompt or PowerShell.
-
Type:
-
Hit Enter.
If you see a list of available options and commands, congrats you’ve successfully installed Nmap on Windows.
Run Your First Basic Scan
Here’s where fun begins.
Basic Scan
To perform a simple scan and check what’s open on a target, use:
Example:
This will show open ports, filtered ports, and closed ones basically giving you an overview of what services are active.
Scan Specific Ports
Sometimes, you don’t want to scan everything. You just want to check one or two important ports like port 80 (HTTP) or port 22 (SSH).
Single Port Scan
This checks if port 80 is open on target host.
Multiple Ports
This scans several common service ports at once FTP, SSH, HTTP, and HTTPS.
All Ports
Feeling adventurous? Try scanning all 65,535 ports:
Be patient it’ll take longer, but you’ll see everything that’s open.
Detect Operating System
Nmap can go beyond just ports it can also guess target’s operating system using fingerprinting techniques.
OS Detection
This tells Nmap to analyze response patterns and identify if target is running Windows, Linux, macOS, or another OS.
It’s not always 100% accurate, but it’s a great start for reconnaissance.
Identify Service Versions
Want to know what’s running on each open port? Maybe Apache 2.4.41 or OpenSSH 8.9?
Version Detection
This command checks each open port and attempts to determine which service and version are running. It’s one of most useful scans for ethical hackers and also one of noisiest for defenders to detect.
Combine Options for Powerful Scans
Real power of Nmap lies in combining flags.
For example:
This performs OS detection, version detection, script scanning, and traceroute all in one command. It’s like saying, “Tell me everything you can about this host.”
Just be cautious when scanning systems you don’t own or have permission to test unauthorized scanning can get you into legal trouble.
If you enjoyed this guide and want to dive deeper into network scanning, ethical hacking, and cybersecurity tools visit Dark OSINT for more tutorials, analyses, and hacker-friendly insights written in plain English.

