Network Ping Sweeps Using nmap
Nmap ("Network Mapper") is a free and open source utility for network exploration and/or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.
Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.
It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and both console and graphical versions are available.
Exercise 1:
1. From a BackTrack shell, type the following (only type what's in bold):
user1@pentest:~# nmap -sP -v class_IP_range/24 > /root/ceh/ps1
Syntax breakdown:
nmap: program name
-sP: program option for ping sweep
-v: verbose mode
class_IP_range/24: replace class_IP_range with the network block to scan (e.g., 10.10.10.0/24)
> /root/ceh/ps1: redirect the output to a file called ps1 in the /root/ceh directory
2. Examine your results:
user1@pentest:~#cat /root/ceh/ps1 | less
3. In the output, look for the text “Host is up” and record these systems’ IP addresses
4. Email your results to proflheureux@gmail.com.
No comments:
Post a Comment