nmap:scan_a_host_to_detect_a_firewall
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
nmap:scan_a_host_to_detect_a_firewall [2016/07/07 23:32] – peter | nmap:scan_a_host_to_detect_a_firewall [2019/12/01 11:07] (current) – removed peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== nmap - Scan a Host to Detect a Firewall ====== | ||
- | Perform a scan on a remote host to detect if any packet filters or Firewall is used by host. | ||
- | |||
- | <code bash> | ||
- | sudo nmap -sA sharewiz.net | ||
- | </ | ||
- | |||
- | Result: | ||
- | |||
- | < | ||
- | Starting Nmap 6.40 ( http:// | ||
- | Nmap scan report for 192.168.1.2 | ||
- | Host is up (0.0011s latency). | ||
- | All 1000 scanned ports on 192.168.1.2 are unfiltered | ||
- | MAC Address: 44: | ||
- | |||
- | Nmap done: 1 IP address (1 host up) scanned in 90.32 seconds | ||
- | </ | ||
- | |||
- | Another machine: | ||
- | |||
- | Result: | ||
- | |||
- | < | ||
- | Starting Nmap 6.40 ( http:// | ||
- | Nmap scan report for sharewiz.net (5.42.134.35) | ||
- | Host is up (0.045s latency). | ||
- | rDNS record for 5.42.134.35: | ||
- | All 1000 scanned ports on sharewiz.net (5.42.134.35) are unfiltered (919) or filtered (81) | ||
- | |||
- | Nmap done: 1 IP address (1 host up) scanned in 2.51 seconds | ||
- | </ |
nmap/scan_a_host_to_detect_a_firewall.1467934360.txt.gz · Last modified: 2020/07/15 09:30 (external edit)