Using NMAP for ports
monitoring
Nmap (Network Mapper)
is a security scanner originally written by Gordon Lyon (also known by his pseudonym Fyodor Vaskovich)[1]used
to discover hosts and services on a computer network, thus creating a
"map" of the network. To accomplish its goal, Nmap sends specially
crafted packets to the target host and then analyzes
the responses.
The software provides a
number of features for probing computer networks, including host discovery and
service and operating system detection. These features are
extensible by scripts that provide more advanced service detection,[2] vulnerability detection,[2]and
other features. Nmap is also capable of adapting to network conditions
including latency and congestion during a scan. Nmap is under
development and refinement by its user community.
Nmap was originally a Linux-only
utility,[3] but it was ported to Microsoft
Windows, Solaris, HP-UX, BSD variants (including Mac OS X),AmigaOS, and SGI IRIX. Linux
is the most popular platform, followed closely by Windows
This is the first and most basic
form of network scan that can be done with nmap, to detect hosts that are alive
and responding on the network.
$ nmap -sP
192.168.1.1-254
Starting Nmap
5.21 ( http://nmap.org ) at 2012-08-15 18:45 IST
Nmap scan
report for 192.168.1.1
Host is up
(0.0069s latency).
Nmap scan
report for 192.168.1.2
Host is up
(0.0012s latency).
Nmap scan
report for 192.168.1.101
Host is up
(0.000065s latency).
Nmap done: 254
IP addresses (3 hosts up) scanned in 6.64 seconds
In the above command we scan all ip
addresses from 192.168.1.1 to 192.168.1.254
Thats the range and can be specified by the short syntax of 192.168.1.1-254
Thats the range and can be specified by the short syntax of 192.168.1.1-254
Comments
Post a Comment