Tag: nmap

Enumeration, Linux, Network, NMAP

Host discovery

Host discovery arp-scan sudo arp-scan 192.168.1.0/24sudo arp-scan 192.168.1.0/24 To install arp-scan issue the command: sudo apt-get install arp-scansudo apt-get install arp-scan arp-scan home page http://nta-monitor.com/tools-resources/security-tools/arp-scan ping ping -c 2 192.168.1.2ping -c 2 192.168.1.2 send 2 ICMP ECHO REQUEST packets to 192.168.1.2 machine nmap sudo nmap -sn -PE –send-ip 192.168.1.0/24sudo nmap -sn -PE –send-ip 192.168.1.0/24 -sn …

Python

Using nmap from python

python-nmap is a python library which helps in using nmap port scanner. It supports nmap script outputs. python-nmap For Ubuntu users: sudo apt-get install python-nmapsudo apt-get install python-nmap #!/usr/bin/env python import nmap nm = nmap.PortScanner() nm.scan(’127.0.0.1′, ’21-443’) for host in nm.all_hosts(): print(’—————————————————-‘) print(’Host : %s (%s)’ % (host, nm[host].hostname())) print(’State : %s’ % nm[host].state()) for …

NMAP

Nmap options summary

NMAP Options Summary Nmap 6.01 ( http://nmap.org ) Usage: nmap [Scan Type(s)] [Options] {target specification} TARGET SPECIFICATION: Can pass hostnames, IP addresses, networks, etc. Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254 -iL : Input from list of hosts/networks -iR : Choose random targets –exclude : Exclude hosts/networks –excludefile : Exclude list from file HOST DISCOVERY: -sL: List …

Linux, NMAP, Tor

Anonymous port scanning through the tor network

To accomplish this task you have to install privoxy and proxychains on your system. For ubuntu users just issue the following command: sudo apt-get install privoxy proxychains proxychains is configured by default to work with the Tor network. Now that we have privoxy and proxychains installed we can issue the following command in the terminal: …

NMAP

Identifying the version number of running services

If you wish to identify the software Version (-sV flag) of services running on machine’s open ports, just provide the -sV flag to nmap. Type the command: nmap -sV x.x.x.x where x.x.x.x is the ip address that you wish to scan.   You will get an answer similar to this: Starting Nmap 5.21 ( http://nmap.org …