0% found this document useful (0 votes)
19 views2 pages

#PT

The document discusses several common network utilities including whois, dig, traceroute, nslookup, nmap, and ping. Whois is used to lookup domain and IP registration details. Dig and nslookup query DNS servers. Traceroute traces the route between hosts. Nmap scans networks and identifies open ports. Ping sends echo requests to find active hosts.

Uploaded by

fckacc1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views2 pages

#PT

The document discusses several common network utilities including whois, dig, traceroute, nslookup, nmap, and ping. Whois is used to lookup domain and IP registration details. Dig and nslookup query DNS servers. Traceroute traces the route between hosts. Nmap scans networks and identifies open ports. Ping sends echo requests to find active hosts.

Uploaded by

fckacc1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

#WHOIS

The whois command is a network utility available in most Unix-like operating


systems (including Linux) and Windows. It is used to retrieve information about
domain names, IP addresses, and other network-related entities from the WHOIS
database. The WHOIS database contains registration and ownership details of domain
names and IP addresses.

Usage:
To use the whois command, you typically open a terminal or command prompt and type
the command followed by the domain name or IP address you want to look up.

The basic syntax is:


whois domain_name_or_ip_address

#DIG

The dig command is another network utility commonly found in Unix-like operating
systems (such as Linux) and is used for querying DNS (Domain Name System) servers
to retrieve information about domain names, IP addresses, and other DNS-related
records. The primary purpose of the dig command is to perform DNS lookups and
diagnostics.

Usage:
To use the dig command, you open a terminal or command prompt and type the command
followed by the domain name or IP address you want to query.

The basic syntax is:


dig domain_name_or_ip_address [query_type]

#TRACEROUTE

The traceroute command is a network utility used to trace the route that packets
take from your computer to a destination IP address or domain name. It provides
valuable information about the path packets follow through the internet, including
the sequence of routers and the time it takes for packets to travel between each
hop. This can be helpful for diagnosing network connectivity issues and identifying
potential bottlenecks.

Usage:
To use the traceroute command, you typically open a terminal or command prompt and
type the command followed by the destination IP address or domain name you want to
trace.

The basic syntax is:


traceroute destination_ip_or_domain

#NSLOOKUP

The nslookup (short for "name server lookup") command is a network utility used to
query DNS (Domain Name System) servers to retrieve information about domain names,
IP addresses, and other DNS-related records. It's commonly used to troubleshoot DNS
issues, verify DNS configurations, and obtain DNS-related information.

Usage:
To use the nslookup command, you typically open a terminal or command prompt and
type the command followed by the domain name or IP address you want to query.
The basic syntax is:
nslookup domain_name_or_ip_address [dns_server]

#NMAP

Nmap (Network Mapper) is a powerful and versatile open-source network scanning tool
used to discover hosts and services on a network, as well as perform security
auditing and exploration. Nmap supports various types of scans, including port
scanning, version detection, OS detection, and more. Port scanning is one of its
primary use cases, where it helps identify open ports on target systems.

Usage:
To perform a port scan using Nmap, you typically open a terminal or command prompt
and type the command followed by the target IP address or hostname you want to
scan.

The basic syntax is:


nmap target_ip_or_hostname

#PING

A "ping scan" is a type of network scan that uses ICMP (Internet Control Message
Protocol) echo requests to determine whether hosts are alive on a network. It's a
basic and quick method to discover active hosts without necessarily identifying
open ports or gathering detailed information about the hosts. Ping scans are often
used to perform a fast initial reconnaissance of a network to identify active hosts
before proceeding with more in-depth scanning.

Nmap, the network scanning tool I mentioned earlier, supports ping scanning as one
of its features. Here's how you can perform a ping scan using Nmap:

Usage:
To perform a ping scan using Nmap, you typically open a terminal or command prompt
and type the command followed by the target IP range or hostname.

The basic syntax for a ping scan is:


nmap -sn target_ip_range_or_hostname

You might also like