enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. How do you scan multiple subnets using Nmap?

    security.stackexchange.com/questions/261375

    I'm looking to scan a network with multiple subnets. I'm looking for a way to shorten this to one command rather than entering each subnet. So let's say I'm try to scan 192.168.1.xx, 192.168.2.xx and so on until 192.168.10.xx. with a specified port. Is there a better way to do this or can I only scan one at a time?

  3. Could Nmap scan switches/routers - Information Security Stack...

    security.stackexchange.com/questions/13885

    Yes, provided the devices are reachable on the network they can be scanned. The accuracy of the results (e.g. fingerprinting) is dependant on the platform, software version, running services and configuration. Example: $ nmap -A -T4 10.1.1.1. Nmap scan report for 10.1.1.1. Host is up (0.020s latency).

  4. nmap - difference between icmp ping scan and normal ping scan ...

    security.stackexchange.com/questions/254904/difference-between-icmp-ping-scan...

    You see, nmap has several "phases" during a scan. In the first phase, called Host Discovery, all targets are pinged, to see if they are online. During the second phase, the actual port scan is performed. The commands -sL, -sn and -Pn modify this behavior. -sL only lists the targets to be scanned, skipping both the host discovery and the port ...

  5. With Nmap it is possible to scan according mac address?

    security.stackexchange.com/questions/117710

    With nmap, you do scan for services at the IP layer (3) of the ISO/OSI model. Mac addresses are layer 2. This would not keep you from resolving mac addresses to IP addresses using . arp -na and working your way from there, though.

  6. When nmap runs as a non-root user, it performs a TCP scan by default. TCPwrapper is software at host machine which closes the TCP connection after three way handshake when the client has no access to a particular port. So run nmap as a root user which uses SYN stealth scan for port scanning.

  7. network - How to use nmap through proxychains? - Information...

    security.stackexchange.com/questions/122561

    Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f Not shown: 992 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 139/tcp filtered netbios-ssn 445/tcp filtered microsoft-ds 514/tcp filtered shell 1434/tcp filtered ms-sql-m 9929/tcp open nping-echo 31337/tcp open Elite Read data files from: /usr ...

  8. nmap - How can I detect the remote operating system? -...

    security.stackexchange.com/questions/118603

    15. Using nmap: sudo nmap -O <target>. Or if they block your ping probes you can do: sudo nmap -O <target> -Pn. Sometimes you still get fake results and you should try doing an aggressive scan (can be detected and blocked by the firewall). sudo nmap -A <target>. Share. Improve this answer.

  9. How to detect hosts running in virtual machines with nmap?

    security.stackexchange.com/questions/2852

    Nmap is best launched from inside Metasploit. See the Metasploit Unleashed (free training available from Offensive-Security) section on Port Scanning for more information. If the target IP address is available from the global Internet, then I suggest you also check out MyIPNeighbors and SHODAN , which are incredibly resourceful for this sort of ...

  10. Find SMBv1 status with Nmap - Information Security Stack Exchange

    security.stackexchange.com/questions/155769

    You can use this via nmap -sU --script smb-vuln-ms08-067.nse -p U:137 <host> or nmap --script smb-vuln-ms08-067.nse -p445 <host>. nmap --script smb-os-discovery.nse -p445 127.0.0.1 will detect the host & protocol, you would just need to use grep to see if it's still smbv1 supported. For the Latest SMBv2 Exploit Detection, use: https://github ...

  11. How does nmap do a zombie and decoy scan?

    security.stackexchange.com/questions/45381

    Nmap probes the Zombie to determine its IP ID sequence class and the current value it is using. Nmap then sends TCP SYN packets to various ports on the target, but spoofs the source address to be that of the Zombie. During the scan, Nmap continually probes the Zombie to find out how many packets it has sent. Expecting one packet per probe, if ...