Find the answer to your Linux question:
Page 2 of 3 FirstFirst 1 2 3 LastLast
Results 11 to 20 of 21
Better yet.. Code: man nmap...
Enjoy an ad free experience by logging in. Not a member yet? Register.
  1. #11
    Linux Engineer
    Join Date
    Mar 2005
    Location
    Where my hat is
    Posts
    766

    Better yet..

    Code:
    man nmap
    Registered Linux user #384279
    Vector Linux SOHO 7

  2. #12
    Linux Newbie
    Join Date
    Apr 2005
    Posts
    235
    no "nmap ip" will scan that ip for open ports. what i need is soemthing to ping each ip address of a range to find if they are responding or not

  3. #13
    Linux Engineer
    Join Date
    Mar 2005
    Location
    Where my hat is
    Posts
    766
    One.. More.. Time..

    Code:
    man nmap
    Registered Linux user #384279
    Vector Linux SOHO 7

  4. #14
    Linux Newbie
    Join Date
    Apr 2005
    Posts
    235
    ive read thing thru about 30 times, i use nmap all the time. the point is that nmap is a port scanner. a port scanner is one that sends an IP address different packages to test whether or not the recieving port is open. then we can also use it to determine what software is running on that port and a whole bunch of other stuff (ok ill stop there b4 i go into hacking). what i need is an IP scanner. an IP scanner will ping a list or range of different hosts to determine whether they are up or not. this allows a person to find other computers on the same network.

  5. #15
    Linux Engineer
    Join Date
    Mar 2005
    Location
    Where my hat is
    Posts
    766
    TARGET SPECIFICATION
    Everything that isn't an option (or option argument) in
    nmap is treated as a target host specification. The sim*
    plest case is listing single hostnames or IP addresses on
    the command line. If you want to scan a subnet of IP
    addresses, you can append /mask to the hostname or IP
    address. mask must be between 0 (scan the whole Internet)
    and 32 (scan the single host specified). Use /24 to scan
    a class "C" address and /16 for a class "B".

    Nmap also has a more powerful notation which lets you
    specify an IP address using lists/ranges for each element.
    Thus you can scan the whole class "B" network 192.168.*.*
    by specifying "192.168.*.*" or "192.168.0-255.0-255" or
    even "192.168.1-50,51-255.1,2,3,4,5-255". And of course
    you can use the mask notation: "192.168.0.0/16". These
    are all equivalent. If you use asterisks ("*"), remember
    that most shells require you to escape them with back
    slashes or protect them with quotes.

    Another interesting thing to do is slice the Internet the
    other way. Instead of scanning all the hosts in a class
    "B", scan "*.*.5.6-7" to scan every IP address that ends
    in .5.6 or .5.7 Pick your own numbers. For more informa*
    tion on specifying hosts to scan, see the examples sec*
    tion.
    and.....

    -sP Ping scanning: Sometimes you only want to know
    which hosts on a network are up. Nmap can do this
    by sending ICMP echo request packets to every IP
    address on the networks you specify. Hosts that
    respond are up. Unfortunately, some sites such as
    microsoft.com block echo request packets. Thus
    nmap can also send a TCP ack packet to (by default)
    port 80. If we get an RST back, that machine is
    up. A third technique involves sending a SYN
    packet and waiting for a RST or a SYN/ACK. For
    non-root users, a connect() method is used.

    By default (for root users), nmap uses both the
    ICMP and ACK techniques in parallel. You can
    change the -P option described later.

    Note that pinging is done by default anyway, and
    only hosts that respond are scanned. Only use this
    option if you wish to ping sweep without doing any
    actual port scans.
    All the above information was from man nmap. Read it again.
    Registered Linux user #384279
    Vector Linux SOHO 7

  6. #16
    Just Joined!
    Join Date
    May 2005
    Posts
    13
    That's right.
    What do you think nmap does to determine if a host is up and available for portscanning......you guessed it...

    So all you do is leave out the portscanning with an option.
    You CAN scan ranges with Nmap, so here is your "ip scanner"

  7. #17
    Linux Newbie
    Join Date
    Apr 2005
    Posts
    235
    wow. what version do u have. i just realized i had 1.7. i got the new one and now i found that in the man. thx

  8. #18
    Just Joined!
    Join Date
    Dec 2004
    Posts
    9
    U mean a ip range?

    like this :
    nmap 192.168.0.1-27
    this example will scam ip addr from 192.168.0.1 - 192.168.0.27

  9. #19
    Linux Guru anomie's Avatar
    Join Date
    Mar 2005
    Location
    Texas
    Posts
    1,692
    As has been mentioned repeatedly, you want nmap. And has been mentioned repeatedly, now is as good a time as any to become acquainted with the man pages.

    If it's good enough for trinity...

  10. #20
    Linux Guru loft306's Avatar
    Join Date
    Oct 2003
    Location
    The DairyLand
    Posts
    1,666
    Quote Originally Posted by *DEAD*
    no i mean IP scanner.
    one where you punch in 2 ips and it scans for ips inbetween the two. its mainly a hackers tool but id like one for my network. angry IP scanners a good one for windows.
    where you used the term 'hackers' the real term to use there is crackers crackers break into systems hackers fix and run systems.....it is the media that got it wrong!
    ~Mike ~~~ Forum Rules
    Testing? What's that? If it compiles, it is good, if it boots up, it is perfect. ~ Linus Torvalds
    http://loft306.org

Page 2 of 3 FirstFirst 1 2 3 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •