Friday, May 15, 2009

Secrets of Network Cartography: A Comprehensive Guide to nmap

True hacking is about the pursuit of technology, not about illegal or inappropriate technology subversions.
Both TCP and UDP use the IP protocol to traverse the network
Nmap uses TCP/IP protocols to query workstations and the responses are interpreted into useful security information.
A port is a number between 1 and 65,535, and port number references are usually specific to an application.
TCP is not only needy, but it's also a very formal protocol.
ICMP is the tattletale of the network
ping is one of icmp's function.

nmap -v –p 80 ––randomize_hosts 192.168.0.*
nmap -v –p 80 ––randomize_hosts 192.168.1-2.*
nmap -v –p 80 ––randomize_hosts 192.168.1,2.0-255,
nmap -v –p 80 ––randomize_hosts 192.168.1-2.1,2-5,6-255


No comments:

Post a Comment