![]() ![]() If you're using Windows 2000, go to Start > Program Files > Accessories > Command Prompt.If you're using Windows XP, go to Start > All Programs > Accessories > Command Prompt. ![]() The profile editor is also a good way to experiment with other scan parameters since the editor itself presents many of the nmap options as part of its user interface. Also if you want to permanently add these to the “Profile” drop-down list then use the built-in profile editor (under the Profile menu). ConclusionĪs a further exercise try using some of the scans listed in the first two parts of this series by entering them directly into the “Command” field. Hosts with filtered ports will have a yellow padlock symbol next to them. If a host has less than three open ports, it will be green more than three but less than six open ports, yellow and more than six open ports, red. Click the “Controls” button and use the Zoom functions to enlarge the picture if necessary.Įach circle on the diagram represents a host found on the network. Click the “Topology” tab to see the overview of your entire network. You can also see a graphic representation of your network, called a network topology. After the scan, the OS icons will change in the hosts list on the left and the Ports/Hosts tab plus the “Host Details” tab will offer more information about each host. Run an Intense scan against 192.168.1.1/24 to discover all the open ports and operating system on each host. Zenmap will scan the host for open ports and populate the “Ports/Hosts” tab: But if we start a port scan of that host, the “Ports/Hosts” tab will be populated with the new information.Įnter one of the hosts in your network into the “Target” field, select “Regular scan” from the Profile drop-down list and click “Scan”. If you select a host from the list on the left and then click on the “Ports/Hosts” tab, there will be no information. This means the more scans you do, the more information is available.Īfter a Ping scan, there is no information about the open ports. Each one of these tabs shows more information about your network and the information presented is accumulative. Above the output pane is a set of tabs: “Nmap Output”, “Ports/Hosts”, “Topology”, “Host Details” and “Scans”. ![]() The result will look something like this:ĭown the left side of the window, you will see a list of the devices (hosts) found on your network and on the right, the output from the nmap command. For more details, please see the previous parts of this series.Ĭlick “Scan”. If you are using a different network range from 192.168.1.x then I will assume from here on that you know how to enter the correct range. In the “Target” field enter 192.168.1.1/24 and select “Ping scan” from the Profile list. The easiest thing to do is a Ping scan to see what devices are alive on your network. The power of Zenmap is that it stores and sorts all the information from any scans performed and allows you to build up a picture of your network. If you are familiar with nmap or you want to try out some of the commands from the previous articles, you can use the “Command” field directly. There are two main ways to start nmap scan using Zenmap, either by entering a target address and selecting a scan type from the “Profile” drop-down list or by entering the command directly in the “Command” field. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |