Live Host Scanning by Free LAN network security IP scanner software Nmap
“Nmap is best network vulnerability scanning software or one of network security audit tools used to scan LAN network. In this article I will use nmap network scanner to scan network.” It is a free network discovery software.
Ping command is used to check the connectivity between the hosts in network. It sends an ICMP packet containing 8 and 0 code indicating this packet is and echo request. Target received this packet and response with another ICMP packets contain 0 code indicating an echo reply. A successful Ping and response would show that the System in a network to be a “Live Host”.
Ping Sweep Scanning using Kali Linux
A ping sweep (otherwise called an ICMP sweep) is a fundamental system scanning strategy used to figure out which of an range of IP address guide to live hosts (Computer). Although a single ping will let you know whether one specified host machine up on the network, a ping sweep comprises of ICMP (Internet Control Message Protocol) ECHO requests sent to multiple hosts. In the event that a given address is live, it will give back an ICMP ECHO response. Ping sweeps are among the more seasoned and slower strategies used to scan a network.
There are various tools that might be used to do a ping sweep, for example, fping, gping, and nmap for UNIX platform.
Namp is free network port scanner tool used for scanning and test security. it is find out network vulnerability.
IP Address Scanning Within Ranges
Characterizing a set of targets utilizing an IP address range is truly nice. And scanning network is handled by IP address scanner nmap. For this example the address will be the 192.168.56.x class c address range. This will mean that the greatest number of has that might be incorporated in the sweep is 254. To output the greater part of the hosts, utilize the following command.
#nmap -sn 192.168.56.100-150
This same sweep might be finished utilizing the CIDR method for addressing to by utilizing the/24 postfix as takes after.
#nmap -sn 192.168.56.0/24
Nmap can additionally utilize a content record as info for the target list. Expect that the following addresses are put away in a document called targets.txt.
The scanning can be performed by using given command
#nmap –iL /Location_Target.txt