User Tools

Site Tools


nmap:scan_a_host_to_detect_a_firewall

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
nmap:scan_a_host_to_detect_a_firewall [2016/07/07 23:31] – created peternmap:scan_a_host_to_detect_a_firewall [2019/12/01 11:07] (current) – removed peter
Line 1: Line 1:
-====== nmap - Scan a Host to Detect a Firewall ====== 
- 
-Perform a scan on a remote host to detect if any packet filters or Firewall is used by host. 
- 
-<code bash> 
-sudo nmap -sA sharewiz.net 
-</code> 
- 
-Result: 
- 
-<code> 
-Starting Nmap 6.40 ( http://nmap.org ) at 2016-07-08 00:28 BST 
-Nmap scan report for 192.168.1.2 
-Host is up (0.0011s latency). 
-All 1000 scanned ports on 192.168.1.2 are unfiltered 
-MAC Address: 44:A8:42:34:16:49 (Unknown) 
- 
-Nmap done: 1 IP address (1 host up) scanned in 90.32 seconds 
-</code> 
  
nmap/scan_a_host_to_detect_a_firewall.1467934294.txt.gz · Last modified: 2020/07/15 09:30 (external edit)

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki