Scanning with Nmap
Login Kioptrix :
john
TwoCows2

After Login

ping 8.8.8.8

In Kali :
sudo arp-scan -l
The command:
sudo arp-scan -l
Scans your local network for active devices using ARP.
Key points:
sudo
: Needed for network access.-l
: Scans your local subnet (e.g.,/24
).Shows each device’s IP, MAC address, and vendor.
Useful for network discovery, inventory, or detecting unknown devices.

sudo netdiscover -r 192.168.1.0/24
The command:
sudo netdiscover -r 192.168.1.0/24
Finds live devices on the specified LAN range, showing IP, MAC, and vendor.Great for quick network mapping and identifying unknown devices.
Breakdown:
sudo
: Required for low-level network access.netdiscover
: ARP-based network discovery tool.-r 192.168.1.0/24
: Scan this IP range (CIDR format).

nmap -T4 -p- -A 192.168.1.140
The command:
nmap -T4 -p- -A 192.168.1.140
To fully map a router or host and identify services, versions, and potential vulnerabilities.
⚠️ Can be noisy — easily detected on networks. Use with permission only.
Breakdown:
-T4
: Sets faster timing (good speed, less stealth).-p-
: Scans all 65,535 TCP ports.-A
: Enables aggressive scan — includes:OS detection
Version detection
Script scanning
Traceroute

sudo nmap -sU -T4 -p 1-1000 192.168.1.140
The command:
sudo nmap -sU -T4 -p 1-1000 192.168.1.140
Performs a UDP port scan on ports 1–1000 of the target 192.168.1.140
.
Breakdown:
sudo
: Needed for raw packet sending (UDP scan).-sU
: UDP scan mode.-T4
: Faster timing (speeds up the scan).-p 1-1000
: Scan only UDP ports 1 through 1000.192.168.1.1
: Target IP address (e.g., a router or host).
⚠️ Notes:
UDP scans are slower and results may be unreliable (some ports may show
open|filtered
).Firewalls may silently drop UDP packets, making detection harder.
Be patient — UDP scans take longer than TCP scans.

Last updated