10 September, 2015

NMAP scan your network

Nmap exempels
quick scan of your network

nmap -T Aggressive -v -n 192.168.0.100-200


will look like this scan...

....
Discovered open port 9001/tcp on 192.168.0.31
Discovered open port 6200/tcp on 192.168.0.34
Discovered open port 3151/tcp on 192.168.0.37
Discovered open port 261/tcp on 192.168.0.2
Discovered open port 991/tcp on 192.168.0.13
SYN Stealth Scan Timing: About 32.42% done; ETC: 20:05 (0:01:05 remaining)
Discovered open port 7000/tcp on 192.168.0.123
Discovered open port 3322/tcp on 192.168.0.159
Discovered open port 6005/tcp on 192.168.0.142
Discovered open port 89152/tcp on 192.168.0.183
...

Nmap scan report for 192.168.0.168
Host is up (0.00062s latency).
Not shown: 997 closed ports
PORT   STATE SERVICE
23/tcp open  telnet
53/tcp open  domain
80/tcp open  http
MAC Address: 00:00:00:00:00:00 (Cisco-Linksys)

Nmap scan report for 192.168.0.177
Host is up (0.0051s latency).
All 1000 scanned ports on 192.168.0.177 are closed
MAC Address: 0C:71XXXXXXX (Samsung Electronics Co.)

Initiating SYN Stealth Scan at 20:05
Scanning 192.168.0.14 [1000 ports]
Discovered open port 139/tcp on 192.168.0.14
Discovered open port 445/tcp on 192.168.0.14
Completed SYN Stealth Scan at 20:05, 1.67s elapsed (1000 total ports)
Nmap scan report for 192.168.0.14
Host is up (0.0000070s latency).

No comments: