Existen varias formas de escanear una rango de IPs con nmap, una de ellas es utilizar comodines:
Ejemplo:
[root@LINUX1 ~]# nmap 172.17.*.*
Starting Nmap 5.51 ( http://nmap.org ) at 2013-11-02 11:38 CET
Nmap scan report for site1.linux1.local (172.17.0.1)
Host is up (0.0047s latency).
Not shown: 991 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
80/tcp open http
1863/tcp open msnp
1864/tcp open paradym-31
4443/tcp open pharos
5190/tcp open aol
5566/tcp open westec-connect
MAC Address: 00:1A:2B:4F:40:DD (Ayecom Technology Co.)
Nmap scan report for 172.17.0.2
Host is up (0.00012s latency).
Not shown: 986 closed ports
PORT STATE SERVICE
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
902/tcp open iss-realsecure
912/tcp open apex-mesh
3389/tcp open ms-term-serv
4443/tcp open pharos
49152/tcp open unknown
49153/tcp open unknown
49154/tcp open unknown
49157/tcp open unknown
49158/tcp open unknown
49163/tcp open unknown
MAC Address: 00:08:57:C0:10:1E (Polaris Networks)
No hay comentarios:
Publicar un comentario