Active information gathering
#HOST DISCOVERY
ip- show/manipulate routing, network devices, interfaces and tunnels
ip -br -c a
# -br = brief
# -c = color
arp-scan- send ARP requests to target hosts and display responses

#ping
ping- send ICMP ECHO_REQUEST to network hosts

fping- send ICMP ECHO_REQUEST packets to multiple network hosts

Launch fping without "Host Unreachable" errors
fping without "Host Unreachable" errors
nmap- Network exploration tool and security/port scanner

- Discover all the devices on a target network using a ping sweep (ping scan) with Nmap.
-snoption - Ping Scan (ping sweep), disable port scan. It finds the responding hosts. -sn consist of:an ICMP echo request
a TCP SYN to port 443
a TCP ACK to port 80
an ICMP default timestamp
-snmust be run assudo
Copy the found IPs for future references and move on to the port scan phase on each of them.
#netdiscover- an active/passive ARP discovering tool
it utilizes ARP requests
netdiscover -i eth1 -r 192.168.31.0/24

nmap cheatsheet
nmap different scanning techniques
SWITCH
EXAMPLE
DESCRIPTION
-sS
nmap 192.168.1.1 -sS
TCP SYN port scan (Default)
-sT
nmap 192.168.1.1 -sT
TCP connect port scan (Default without root privilege)
-sU
nmap 192.168.1.1 -sU
UDP port scan
-sA
nmap 192.168.1.1 -sA
TCP ACK port scan
-sW
nmap 192.168.1.1 -sW
TCP Window port scan
-sM
nmap 192.168.1.1 -sM
TCP Maimon port scan
#NMAP HOST DISCOVERY
#Metasploit port scanning

Last updated