Geek Memos
  • Home
Sign in Subscribe

nmap

A collection of 3 posts
nmap

TCP Connect Scan using Python

########################################################################### # # Need Python version 2.x, scapy, and python module sys installed on system # Usage: python tcpConnect.py [hostname] [port] # For example: python tcpConnect.py google.com 80 # https://github.com/qasimchadhar/portScan/blob/master/tcpConnect.py # ########################################################################### from socket import * import logging logging.getLogger("scapy.runtime").setLevel(logging.CRITICAL) #S
Mar 1, 2015 1 min read
nmap

Scanning North Korean Public IP space

viahttp://nknetobserver.github.io/ **Some noteworthy points:**- The allocated North Korean network range is 175.45.176.0/22 - 210.52.109.0 – 210.52.109.255 block is assigned to North Korea through Chinese company China Unicom - 77.94.35.0/24 — this block is assigned
Dec 22, 2014 2 min read
grep

Quick Nmap ping sweep and output to grep-able format

Start with laying out what range of IP addresses you want to scan. I’d suggest keeping it limited to your specific targets. Then run this as root: nmap -sn -v -oG nmapped.txt 192.168.1.201-254 * -sn (No port scan) .This option tells Nmap not to do a
Oct 18, 2014 1 min read
Page 1 of 1
Geek Memos © 2023
Powered by Ghost