![]() This next example is more unusual, but fairly clear if you pick out just the right details. When run against my Windows 10 system, a command like that provided a series of “aggressive OS guesses” that included more than a dozen Windows releases. On the other hand, the command intended to identify the OS- sudo nmap -O 192.168.0.28-did identify the system as Linux, but guessed x86_64-redhat-linux-gnu, not Ubuntu. This is a laptop running Ubuntu, though the OS wouldn’t be obvious from the output displayed. It also identifies the device as an Intel-based system. The output from this nmap command lists the open ports and identifies the service that is running. To do port scanning of a single system, you could use a command like this:Īs with the first nmap command shown, you could run a port scan of the entire 192.168.0.x network using 192.168.0.0/24 as the scan target. In the scan above, the “-sn” argument string is telling nmap to discover hosts but not to perform port scans. ![]() In addition, there are at least two other computers in the house, a few tablets, two printers and a scanner. The list shown may seem to include a lot of devices for a home network, but I have a small heterogenous network (one Windows 10 system, two Linux systems and a MacBook Pro) all up and running. The network being scanned is my home network. Notice that host names are provided when they are available to the system. Nmap done: 256 IP addresses (13 hosts up) scanned in 11.58 seconds MAC Address: 7C:67:A2:CF:9F:EF (Intel Corporate) MAC Address: AC:63:BE:CA:10:CF (Amazon Technologies) Nmap scan report for router (192.168.0.1) Run the command with sudo,and you’ll also see the MAC addresses along with some vendor information: $ sudo nmap -sn 192.168.0.0/24 Nmap done: 256 IP addresses (11 hosts up) scanned in 11.78 seconds Nmap scan report for dragonfly (192.168.0.11)
0 Comments
Leave a Reply. |