Active information gathering

#HOST DISCOVERY

ip - show/manipulate routing, network devices, interfaces and tunnels

ip -br -c a
# -br = brief
# -c  = color

arp-scan - send ARP requests to target hosts and display responses

#ping

ping - send ICMP ECHO_REQUEST to network hosts

fping - send ICMP ECHO_REQUEST packets to multiple network hosts

Launch fping without "Host Unreachable" errors

nmap - Network exploration tool and security/port scanner

- Discover all the devices on a target network using a ping sweep (ping scan) with Nmap.

  • -sn option - Ping Scan (ping sweep), disable port scan. It finds the responding hosts. -sn consist of:

    • an ICMP echo request

    • a TCP SYN to port 443

    • a TCP ACK to port 80

    • an ICMP default timestamp

    • -sn must be run as sudo

#netdiscoverarrow-up-right - an active/passive ARP discovering tool

  • it utilizes ARP requests

netdiscover -i eth1 -r 192.168.31.0/24

nmap cheatsheet

nmap different scanning techniques

SWITCH

EXAMPLE

DESCRIPTION

-sS

nmap 192.168.1.1 -sS

TCP SYN port scan (Default)

-sT

nmap 192.168.1.1 -sT

TCP connect port scan (Default without root privilege)

-sU

nmap 192.168.1.1 -sU

UDP port scan

-sA

nmap 192.168.1.1 -sA

TCP ACK port scan

-sW

nmap 192.168.1.1 -sW

TCP Window port scan

-sM

nmap 192.168.1.1 -sM

TCP Maimon port scan

#NMAP HOST DISCOVERY

#Metasploit port scanning

Last updated