Scanning with Nmap
Login Kioptrix :
john
TwoCows2
sudo arp-scan -l
The command:
Scans your local network for active devices using ARP.
sudo: Needed for network access.
-l: Scans your local subnet (e.g., /24).
Shows each device’s IP, MAC address, and vendor.
Useful for network discovery, inventory, or detecting unknown devices.
sudo netdiscover -r 192.168.1.0/24
The command:
Finds live devices on the specified LAN range, showing IP, MAC, and vendor.Great for quick network mapping and identifying unknown devices.
sudo: Required for low-level network access.
netdiscover: ARP-based network discovery tool.
-r 192.168.1.0/24: Scan this IP range (CIDR format).
nmap -T4 -p- -A 192.168.1.140
The command:
To fully map a router or host and identify services, versions, and potential vulnerabilities.
⚠️ Can be noisy — easily detected on networks. Use with permission only.
-T4: Sets faster timing (good speed, less stealth).
-p-: Scans all 65,535 TCP ports.
-A: Enables aggressive scan — includes:
sudo nmap -sU -T4 -p 1-1000 192.168.1.140
The command:
Performs a UDP port scan on ports 1–1000 of the target 192.168.1.140.
sudo: Needed for raw packet sending (UDP scan).
-T4: Faster timing (speeds up the scan).
-p 1-1000: Scan only UDP ports 1 through 1000.
192.168.1.1: Target IP address (e.g., a router or host).
UDP scans are slower and results may be unreliable (some ports may show open|filtered).
Firewalls may silently drop UDP packets, making detection harder.
Be patient — UDP scans take longer than TCP scans.
Last updated