Nmap deep dive
We’ve seen how the humble ping command can tell us not just if our machines are reachable, but how many of them are on the local network. If we read into the timings column a bit, we might even speculate about how far away these machines are. However, for network reconnaissance and port scanning, you can’t beat Nmap.
Since we’ve already got an XML list of machines on our LAN it would be nice if we could re-use it here to save scanning again. Sadly, the XML files generated by Nmapsi4’s network discovery can’t be easily digested by Nmap itself (or we couldn’t figure out a way). So let’s open a terminal and do it manually. To start, just enter the following:
$ sudo nmap 192.168.0.0/24
This will scan the
You’re reading a preview, subscribe to read more.
Start your free 30 days