Scanning a network range

The following example has a network range of 192.168.202.0/24, and the scan type chosen is an intense scan with no ping. You then click the Scan button and your scan runs. During the scan, you will see the output in the Nmap Output tab on the screen. From our scan, we see we have six active hosts on the network. From the icons next to the IP addresses, we can tell we have identified two Windows machines, two Linux machines, and two unknown OS systems. Notice how, in the Command field in the following screenshot, as you set your scan variables, the command-line variables show up in this field. This is a good way to learn how to use Nmap from the command line:

If a network has ICMP turned off, attempting to ping the ...

Get Kali Linux 2018: Windows Penetration Testing - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.