The easiest way to skyrocket your YouTube subscribers
Get Free YouTube Subscribers, Views and Likes

NMap 101: Scanning For Multiple Targets Haktip 92

Follow
Hak5

Hak5 Cyber Security Education, Inspiration, News & Community since 2005:
____________________________________________
Get FreshBooks: http://www.freshbooks.com/specialoff...

This week on HakTip Shannon is scanning for multiple targets in NMap.

Last week we discussed the simple task of installing NMap and scanning for a selected Target. I chose to scan my Synology NAS to show you a quick outline of what to expect whenever your scan has completed. Now lets say you want to scan multiple targets at once. Instead of scannin them one at a time, you can just do them all in one command like this: nmap 192.168.10.1 192.168.10.15 192.168.10.56 and so on. This will list each of them in the same order, starting with your first IP address, then second... then third... The list will look similar to just scanning one target. Also, if they are all on the same subnet you can also type your command like this: nmap 192.168.10.1,15,56 and it'll output the same information.
If you wanted to scan a range of IP's, that looks a little different. You would simply type: nmap 192.168.10.1100 and it will output any and all networked hardware that is currently on and connected between those IP address ranges. If you want, you can also change this to a different class of subnet, or a range of networks by doing the same thing, but typing 192.168.1100.*. That wildcard (remember our Linux Terminal 101 series?) will scan ALL ranges from 0255 in that subnet. After the break, we'll try scanning an entire subnet.

Ready to scan an entire subnet. Back in the terminal, let's type: nmap 192.168.10.1/24. This /24 looks a little weird. It is a CIDR notation of the network address and the subnet mask in binary bits. Again, this command will give you very similar information on a long list of outputs.
Here is a fun one. You can scan a list of targets from IP addresses you had previously entered into a text file. We will create a list: cat list.txt. Then, we will enter a few IP addresses that we want to scan. This time we are adding a syntax. Type: nmap iL list.txt. Nmap will scan IP addresses in the 'list' of targets from list.txt. It will read each line as a new IP address.
The scan will look the same as all others above.

What would you like to see next about NMAP? Send me a comment below or email us at [email protected].
And be sure to check out our sister show, Hak5 for more great stuff just like this. I'll be there, reminding you to trust your technolust.

~~~~~~~~~
Please watch: "Bash Bunny Primer Hak5 2225"
   • Bash Bunny Primer  Hak5  2225  
~~~~~~~~~
____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.

posted by linalamont512c0