How To Run A Host Scan
How To Run A Host Scan
◾️ A more powerful way to scan your networks is to use Nmap to perform a host scan. Unlike a ping scan, a host scan actively sends ARP request packets to all the hosts connected to your network. Each host then responds to this packet with another ARP packet containing its status and MAC address. ◾️
To run a host scan, use the following command:
# nmap -sp <target IP range>
This returns information on every host, their latency, their MAC address, and also any description associated with this address. This can be a powerful way of spotting suspicious hosts connected to your network.
If you see anything unusual in this list, you can then run a DNS query on a specific host, by using:
# namp -sL <IP address>
This returns a list of names associated with the scanned IP. This description provides information on what the IP is actually for.
1. Ping Scanning
◾️ # ◾️
2. Port Scanning
◾️ # sS TCP SYN scan ◾️
◾️ # sT TCP connect scan ◾️
◾️ # sU UDP scans ◾️
◾️ # sY SCTP INIT scan ◾️
◾️ # sN TCP NULL ◾️
3. Host Scanning
◾️ # nmap -sp <target IP range> ◾️
4. OS Scanning
◾️ nmap -O <target IP> ◾️
5. Scan The Most Popular Ports
◾️ nmap --top-ports 20 192.168.1.106 ◾️
6. Output To A File
◾️ -oN output.txt ◾️ (To a Text File)
◾️ -oX output.xml ◾️ (To An XML)
7. Disable DNS Name Resolution
◾️ # nmap -sp -n 192.100.1.1/24 ◾️
Comments
Post a Comment