Penetration Testing mailing list archives

Re: Nmap


From: Jeffory Atkinson <jatkinson () zelvin com>
Date: Sat, 1 Oct 2011 22:37:19 -0400

All depends on what you are trying to achieve. I would assume that you are not concerned about monitoring devices 
seeing you have done a ping sweep with nmap. I agree with others a port scan is going to give you the best idea if a 
host is active. There are Many instances filtering devices can drop icmp or respond for hosts behind them.  Open ports 
and services are the best identifiers. A port has to be open in some form (open or filtered) to interact with in-bound 
connections. I would recommend a -sS (syn) scan you can opt for standard services or add -p1- for all 65k+ ports. All 
ports will verify and services/demons running. There are other options if bandwidth is an issue. 


On Sep 30, 2011, at 5:17 PM, Ukpong <ukpong.ukpong () gmail com> wrote:

Can somebody suggest the best NMAP commands for identifying hosts that
are not responding to ICMP ping requests ?

------------------------------------------------------------------------
This list is sponsored by: Information Assurance Certification Review Board

Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT 
and CEPT certs require a full practical examination in order to become certified. 

http://www.iacertification.org
------------------------------------------------------------------------


------------------------------------------------------------------------
This list is sponsored by: Information Assurance Certification Review Board

Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT 
and CEPT certs require a full practical examination in order to become certified.

http://www.iacertification.org
------------------------------------------------------------------------


Current thread: