Warriors.to Underground Forum - Hack Forum - Leak Forum
  • Home
  • Forums
    New posts Search forums
  • Resources
    Latest reviews Search resources
  • Members
    Current visitors New profile posts Search profile posts
  • Awards
  • Chat 0
Log in Register
What's new Search

Search

By:
Advanced search…
Warriors.to Underground Forum - Hack Forum - Leak Forum
    • Home
    • Forums
    • Underground
    • Network Hacking/Security
  • Home
  • Forums
  • Underground
  • Network Hacking/Security
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an alternative browser.

(NMAP) Network scanning

  • Thread starter Lexter
  • Start date Nov 30, 2022
L

Lexter

Member
Messages
27
Joined
Nov 30, 2022
Reaction score
21
Points
3
wCoin
508
  • Nov 30, 2022
  • #1

Simple NMAP scan of IP range​

The default scan of nmap is to run the command and specify the IP address(es) without any other options. In this default scan, nmap will run a TCP SYN connection scan to 1000 of the most common ports as well as an icmp echo request to determine if a host is up.
Please, Log in or Register to view URLs content!

There are four ways to scan multiple IP addresses:

1) Specify IPs one-by-one separated by space​

nmap 192.168.10.1 192.168.10.111 192.168.10.222
Starting Nmap 7.12 (
Please, Log in or Register to view URLs content!
) at 2016-04-25 21:55 GTB Daylight Time
Nmap scan report for 192.168.10.1
Host is up (0.0032s latency).
Not shown: 998 closed ports
PORT STATE SERVICE
80/tcp open http
20031/tcp filtered unknown
MAC Address: D8:D4:3C:F2:AA:79 (Sony)
Nmap scan report for 192.168.10.111
Host is up (0.0056s latency).
Not shown: 991 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
80/tcp open http
139/tcp open netbios-ssn
443/tcp open https
445/tcp open microsoft-ds
873/tcp open rsync
3493/tcp open nut
8080/tcp open http-proxy
MAC Address: 00:08:9B:8B:F5:EB (ICP Electronics)
Nmap scan report for 192.168.10.222
Host is up (0.0022s latency).
Not shown: 996 filtered ports
PORT STATE SERVICE
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
5357/tcp open wsdapi
MAC Address: 00:1A:4D:58:1A:06 (Giga-byte Technology)
Nmap done: 3 IP addresses (3 hosts up) scanned in 11.46 seconds

2) Specify IPs in consecutive range​

nmap 192.168.10.100-230
Starting Nmap 7.12 (
Please, Log in or Register to view URLs content!
) at 2016-04-25 22:03 GTB Daylight Time
Nmap scan report for 192.168.10.111
Host is up (0.0029s latency).
Not shown: 991 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
80/tcp open http
139/tcp open netbios-ssn
443/tcp open https
445/tcp open microsoft-ds
873/tcp open rsync
3493/tcp open nut
8080/tcp open http-proxy
MAC Address: 00:08:9B:8B:F5:EB (ICP Electronics)
Nmap scan report for 192.168.10.222
Host is up (0.0097s latency).
Not shown: 996 filtered ports
PORT STATE SERVICE
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
5357/tcp open wsdapi
MAC Address: 00:1A:4D:58:1A:06 (Giga-byte Technology)
Nmap done: 131 IP addresses (2 hosts up) scanned in 6.52 seconds

3) Specify a scan range of IPs using a wildcard​

nmap 192.168.10.*

4) Specify a scan range of IPs using a subnet notation​

nmap 192.168.10.0/24

Scan all ports of an IP range​


The simple default scan above will check the 1000 most well known ports for each IP address. What if you want to scan ALL ports of the IP range under scope. Let’s see how to run this:

Assume we want to find all open ports in class C subnet 192.168.10.0/24

1st way

nmap -p- 192.168.10.0/24


2nd way​


nmap -p 1-65535 192.168.10.0/24

Discover Live IPs in a subnet​


This is a “ping scan” to identify live hosts in the specified range.

This scan option uses a combination of scan techniques to identify live hosts, such as sending an icmp echo request, TCP SYN packets to ports 80 and 443, timestamp requests, arp requests etc.
nmap -sP 192.168.10.0/24

Detect OS and Services Running in a subnet​


Now we will see how to scan a range of IPs and detect what Operating System and Services (versions) are running on live hosts.
nmap -A 192.168.10.0/24
There are hundreds of other nmap scan options available which will be covered in future posts, so stay tuned J
 
  • Like
Reactions: Majesty
You must log in or register to reply here.
Share:
Facebook X (Twitter) Reddit Pinterest Tumblr WhatsApp Email Share Link
  • Home
  • Forums
  • Underground
  • Network Hacking/Security


About Warriors.to

It is a real Turkish hacking forum. It was established in 2022 and its aim is to respond to the attacks against Turkey and gather Turkish hackers under one roof.
Gerçek Türk Hack Forumudur. 2022 yılında kurulmuş olup amacı Türkiye'ye yönelik saldırılara karşılık vermek ve Türk hackerları tek çatı altında toplamaktır.

Forum Navigation

  •   Yönetici Listesi
  •   Üye Listesi
  •   Arama Yap

Yardım

  •   Forum Dökümanları

Hesap

  •   Kontrol Panel
  • English (US)
  • Contact us
  • Help
  • Home
  • RSS
Theme Made by W4H9LT 
Advanced Forum Stats, Awards System by AddonFlare - Premium XF2 Addons
Some of the add-ons on this site are powered by XenConcept™ ©2017-2025 XenConcept Ltd. (Details)
| Xenforo Add-ons © by ©XenTR
Top Bottom