Geek Memos
  • Home
Subscribe
Tagged

nmap

A collection of 3 posts

nmap

TCP Connect Scan using Python

########################################################################### # # Need Python version 2.x, scapy, and python module sys installed on system # Usage: python tcpConnect.py [hostname] [port] # For example: python tcpConnect.py google.com 80 # https://github.com/qasimchadhar/portScan/blob/master/tcpConnect.py # ########################################################################### from socket import * import logging logging.getLogger("scapy.runtime").setLevel(logging.CRITICAL)

  • Q
Q Mar 1, 2015 • 1 min read
nmap

Scanning North Korean Public IP space

via  http://nknetobserver.github.io/ **Some noteworthy points:**- The allocated North Korean network range is 175.45.176.0/22 - 210.52.109.0 – 210.52.109.255 block is assigned to North Korea through Chinese company China Unicom - 77.94.35.0/24 — this block is

  • Q
Q Dec 22, 2014 • 2 min read
grep

Quick Nmap ping sweep and output to grep-able format

Start with laying out what range of IP addresses you want to scan. I’d suggest keeping it limited to your specific targets. Then run this as root: nmap -sn -v -oG nmapped.txt 192.168.1.201-254 -sn (No port scan) .This option tells Nmap not to do a

  • Q
Q Oct 18, 2014 • 1 min read
Geek Memos © 2022
Powered by Ghost