nmap
This uses the nmap tool to perform a detailed TCP port scan on the IP range 192.168.0.0/24.
sudo nmap -sS -p- -PE -PP -PS80,443 -PA3389 -PU40125 -A -T4 -oA tcpscan-%D 192.168.0.0/24
-
sudo: Runs the command with administrative privileges. -
nmap: The command-line tool used for network exploration and security auditing. -
-sS: Performs a TCP SYN scan, which is the default scan type for privileged users. -
-p-: Scans all 65,535 TCP ports. -
-PE: Sends ICMP echo requests (ping) to discover live hosts. -
-PP: Sends ICMP timestamp requests to discover live hosts. -
-PS80,443: Sends TCP SYN packets to ports 80 and 443 (default web server) to discover open ports. -
-PA3389: Sends TCP ACK packets to port 3389 (default RDP) to discover open ports. -
-PU40125: Sends UDP packets to port 40125 (unlikely to be in use) to discover open ports (some services such as thechargenprotocol respond to empty UDP packets). -
-A: Enables aggressive scanning options, including OS detection, version detection, script scanning, and traceroute. -
-T4: Sets the timing template to "Aggressive" to speed up the scan (otherwise it can take quite a while, even on a /24 network). -
-oA tcpscan-%D: Specifies the output file name format.%Dis a placeholder for the current date and time. -
192.168.0.0/24: Specifies the IP range to scan, in this case, all IP addresses from192.168.0.0to192.168.0.255.
For a simpler verbose scan,
sudo nmap -v -A -sS -p- -O target
-
sudo: Runs the command with administrative privileges. -
nmap: The command-line tool used for network exploration and security auditing. -
-v: Enables verbose output, providing more detailed information during the scan. -
-A: Enables aggressive scanning options, including OS detection, version detection, script scanning, and traceroute. -
-sS: Performs a TCP SYN scan, which is the default scan type for privileged users. -
-p-: Scans all 65,535 TCP ports. -
-O: Enables OS detection, which attempts to determine the operating system running on the target. -
target: Specifies the target IP address, DNS name, or CIDR range to scan.
No Comments