Skip to Content
Kali Linux 2018: Windows Penetration Testing - Second Edition
book

Kali Linux 2018: Windows Penetration Testing - Second Edition

by Wolf Halton, Bo Weaver
October 2018
Intermediate to advanced
404 pages
8h 50m
English
Packt Publishing
Content preview from Kali Linux 2018: Windows Penetration Testing - Second Edition

Scanning a network range

The following example has a network range of 192.168.202.0/24, and the scan type chosen is an intense scan with no ping. You then click the Scan button and your scan runs. During the scan, you will see the output in the Nmap Output tab on the screen. From our scan, we see we have six active hosts on the network. From the icons next to the IP addresses, we can tell we have identified two Windows machines, two Linux machines, and two unknown OS systems. Notice how, in the Command field in the following screenshot, as you set your scan variables, the command-line variables show up in this field. This is a good way to learn how to use Nmap from the command line:

If a network has ICMP turned off, attempting to ping the ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Kali Linux 2018: Assuring Security by Penetration Testing - Fourth Edition

Kali Linux 2018: Assuring Security by Penetration Testing - Fourth Edition

Shiva V. N. Parasram, Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali
Hands-On AWS Penetration Testing with Kali Linux

Hands-On AWS Penetration Testing with Kali Linux

Karl Gilbert Gupta, Benjamin Caudill

Publisher Resources

ISBN: 9781788997461Other