What happens then is all discovered addresses will begin filling up the left pane and the output of the scan will fill up the right pane. You could also enter this same command at a bash prompt and get results!Īfter your profile is selected click the Scan button and the scan will begin. When you select the profile you want you will notice the Command section changes to reflect your choices. If you are dealing with consumer-grade hardware (switches and routers), intense scans can completely bottleneck your network. I will warn you - I have seen intense scans cripple smaller network hardware. The Profile drop down is filled with pre-configured scan types that range from simple ping scans to intense scans. That will scan every possible address on that network. If you want to scan your entire network you could enter 192.168.1.* in the Target section. Let’s say, for example, you want to audit a network that is on the 192.168.100.1 IP address scheme. The first thing you will need is a target. Let’s take a look at what is necessary to start an audit of your network. When the Zenmap window opens (see Figure 1) you will see a fairly straight-forward user interface. When the graphical window opens you are ready to start your audit. Or by first su‘ing to the root user (type su and then type the root user password). Because Nmap requires some administrative access to use certain functionalities, you will want to launch Zenmap from the command line like so: There is a catch with the startup of Zenmap. Once installed you will find the tool in Applications > Network. Just mark Zenmap for installation and your package manager will pick up the Nmap requirement automatically. You will find both of these tools in your Add/Remove Software tool. Installation of Zenmap is simple (you will need to also have Nmap installed). In this case that is very much true because Zenmap will give you an interactive graphical map of your network. And besides, as they say “A picture is worth a thousand words”. Although Nmap is incredibly powerful, when working with larger networks most administrators do not want to work with command line only tools. Nmap is an open source tool for network security and auditing. The Zenmap tool is actually a graphical front end for the very popular Nmap command line tool. But what happens when that network outgrows your ability to simply walk around and manually make note of what is up/down, what OS a device is running, or what ports are open? When this happens you need to make use of one of the de facto standard open source network auditing tools - Zenmap. This isn’t a problem if you have a small network. So Nmap is faster by default and, since the port selection is better thanks to the port frequency data, it often finds more open ports as well.Network administrators have many tasks, and auditing the network is at the top of the heap. This is a decrease from 1,715 TCP ports and 1,488 UDP ports in Nmap 4.68.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |