User Tools

Site Tools


nmap:scan_a_host_to_detect_a_firewall

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
nmap:scan_a_host_to_detect_a_firewall [2016/07/07 23:32] peternmap:scan_a_host_to_detect_a_firewall [2019/12/01 11:07] (current) – removed peter
Line 1: Line 1:
-====== nmap - Scan a Host to Detect a Firewall ====== 
  
-Perform a scan on a remote host to detect if any packet filters or Firewall is used by host. 
- 
-<code bash> 
-sudo nmap -sA sharewiz.net 
-</code> 
- 
-Result: 
- 
-<code> 
-Starting Nmap 6.40 ( http://nmap.org ) at 2016-07-08 00:28 BST 
-Nmap scan report for 192.168.1.2 
-Host is up (0.0011s latency). 
-All 1000 scanned ports on 192.168.1.2 are unfiltered 
-MAC Address: 44:A8:42:34:16:49 (Unknown) 
- 
-Nmap done: 1 IP address (1 host up) scanned in 90.32 seconds 
-</code> 
- 
-Another machine: 
- 
-Result: 
- 
-<code> 
-Starting Nmap 6.40 ( http://nmap.org ) at 2016-07-08 00:31 BST 
-Nmap scan report for sharewiz.net (5.42.134.35) 
-Host is up (0.045s latency). 
-rDNS record for 5.42.134.35: bbdp5.42.134.35.network.sure.com 
-All 1000 scanned ports on sharewiz.net (5.42.134.35) are unfiltered (919) or filtered (81) 
- 
-Nmap done: 1 IP address (1 host up) scanned in 2.51 seconds 
-</code> 
nmap/scan_a_host_to_detect_a_firewall.1467934360.txt.gz · Last modified: 2020/07/15 09:30 (external edit)

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki