Facebook Instagram Twitter YouTube

Scan Network for Active Hosts with Nmap in Kali Linux

This tutorial assumes you are working in a Kali Linux environment.

Usage: nmap [Scan Type(s)] [Options] {target specification}

TARGET SPECIFICATION:
Can pass hostnames, IP addresses, networks, etc.
0 Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254
-iL : Input from list of hosts/networks
–exclude : Exclude hosts/networks
–excludefile : Exclude list from file

HOST DISCOVERY:
-sn: Ping Scan – disable port scan. This is a quick way to scan a network to find online hosts.
-PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes
-PO[protocol list]: IP Protocol Ping
-n/-R: Never do DNS resolution/Always resolve [default: sometimes]
–dns-servers : Specify custom DNS servers
–system-dns: Use OS’s DNS resolver
–traceroute: Trace hop path to each host

Share and Enjoy...Tweet about this on TwitterShare on FacebookGoogle+Share on StumbleUponshare on Tumblr