Buscar

Escanear un rango de IPs con nmap usando comodines

Existen varias formas de escanear una rango de IPs con nmap, una de ellas es utilizar comodines:

Ejemplo:


[root@LINUX1 ~]# nmap 172.17.*.*

Starting Nmap 5.51 ( http://nmap.org ) at 2013-11-02 11:38 CET
Nmap scan report for site1.linux1.local (172.17.0.1)
Host is up (0.0047s latency).
Not shown: 991 closed ports
PORT     STATE SERVICE
21/tcp   open  ftp
22/tcp   open  ssh
23/tcp   open  telnet
80/tcp   open  http
1863/tcp open  msnp
1864/tcp open  paradym-31
4443/tcp open  pharos
5190/tcp open  aol
5566/tcp open  westec-connect
MAC Address: 00:1A:2B:4F:40:DD (Ayecom Technology Co.)

Nmap scan report for 172.17.0.2
Host is up (0.00012s latency).
Not shown: 986 closed ports
PORT      STATE SERVICE
80/tcp    open  http
135/tcp   open  msrpc
139/tcp   open  netbios-ssn
445/tcp   open  microsoft-ds
902/tcp   open  iss-realsecure
912/tcp   open  apex-mesh
3389/tcp  open  ms-term-serv
4443/tcp  open  pharos
49152/tcp open  unknown
49153/tcp open  unknown
49154/tcp open  unknown
49157/tcp open  unknown
49158/tcp open  unknown
49163/tcp open  unknown
MAC Address: 00:08:57:C0:10:1E (Polaris Networks)

No hay comentarios:

Publicar un comentario en la entrada