nmap:scan_a_host_to_detect_a_firewall
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
nmap:scan_a_host_to_detect_a_firewall [2016/07/07 23:31] – created peter | nmap:scan_a_host_to_detect_a_firewall [2019/12/01 11:07] (current) – removed peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== nmap - Scan a Host to Detect a Firewall ====== | ||
- | |||
- | Perform a scan on a remote host to detect if any packet filters or Firewall is used by host. | ||
- | |||
- | <code bash> | ||
- | sudo nmap -sA sharewiz.net | ||
- | </ | ||
- | |||
- | Result: | ||
- | |||
- | < | ||
- | Starting Nmap 6.40 ( http:// | ||
- | Nmap scan report for 192.168.1.2 | ||
- | Host is up (0.0011s latency). | ||
- | All 1000 scanned ports on 192.168.1.2 are unfiltered | ||
- | MAC Address: 44: | ||
- | |||
- | Nmap done: 1 IP address (1 host up) scanned in 90.32 seconds | ||
- | </ | ||
nmap/scan_a_host_to_detect_a_firewall.1467934294.txt.gz · Last modified: 2020/07/15 09:30 (external edit)