After installing Nmap, the scanning process can be started by running some general network scans as we have mentioned below:
The Process to Run Ping Scan
Let’s start with the common Nmap function, which is the identification of active hosts on a network. This is done with a ping scan. It will detect the active IP addresses on the network, without the need for sending packets to the hosts. Use the below command to do so:
# nmap -sp 192.100.1.1/24
Once you run this command, you will see a list of the active hosts on the network, along with the assigned IP addresses.
The Process to Run Host Scan
Another great way for scanning networks is host scan in Nmap. It is different from a ping scan, because the host scan sends the ARP request packets to hosts on the network. This is done in an active manner.
When you run the host scan, the hosts will respond to the packet. An ARP packet will be shown which includes the status and MAC address of the host.
Use the below command to run a host scan in Nmap:
# nmap -sp <target IP range>
Once you have run the command, it will show you the information about all the hosts, along with their latency, MAC address, as well as some description. It is a proven way to detect any suspicious hosts that are active on your network.
Leave a Reply