0% found this document useful (0 votes)
9 views6 pages

Y132 Vapt 2

This document outlines the procedure for scanning a network to identify Windows XP and Windows 7 machines using various tools such as Nmap, Netdiscover, Hping3, Fping, and Arping. Each tool is described with specific commands for scanning single IPs, ranges, and subnets. The result confirms successful execution of the commands and verification of the output.

Uploaded by

cxhhwbsk4p
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views6 pages

Y132 Vapt 2

This document outlines the procedure for scanning a network to identify Windows XP and Windows 7 machines using various tools such as Nmap, Netdiscover, Hping3, Fping, and Arping. Each tool is described with specific commands for scanning single IPs, ranges, and subnets. The result confirms successful execution of the commands and verification of the output.

Uploaded by

cxhhwbsk4p
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

EX.

NO : 02
Scan the network for Windows XP and
Windows 7 target machines in local
DATE :
network and virtual network.

Aim:
To scan the network for Windows XP and Windows 7 target machines in local network and
virtual network.

Procedure:

Nmap:
‘Nmap’ (Network Mapper) is a free and open-source network scanning tool used for network
discovery and security auditing. It was created by Gordon Lyon (also known as Fyodor) and
is widely used by network administrators, security professionals, and hackers for various
purposes

Scan a single IP:


nmap 192.168.1.1

Scan specific IPs:


nmap 192.168.1.1 192.168.2.1

Scan a range:
nmap 192.168.1.1-254

Scan a domain:
nmap scanme.nmap.org

TCP SYN port scan (Default):


-sS nmap 192.168.1.1 -sS

Output:

12 717822Y132
Netdiscovers:
‘Netdiscover’ is a network scanning tool designed for discovering hosts on a network. It is
particularly useful for mapping out a local network and identifying active IP addresses and
MAC addresses.

Scan an Entire Subnet


netdiscover -r 192.168.1.0/24

Scan a Specific Range of Ips


netdiscover -r 192.168.1.1-192.168.1.50

Scan Using a Specific Network Interface


netdiscover -i eth0

Active Scan Mode


netdiscover –P

Output:

13 717822Y132
hping3:
‘Hping’ is a command-line oriented TCP/IP packet assembler/analyzer. It is often used for
network security testing and auditing

Ping a Host Using ICMP:


hping3 192.168.1.1

Send TCP SYN Packets to Port 80:


hping3 -S 192.168.1.1 -p 80

Send UDP Packets to Port 53


hping3 --udp 192.168.1.1 -p 53

Perform a Traceroute to a Host


hping3 192.168.1.1 –traceroute

Send Packets at One Packet Per Second


hping3 192.168.1.1 -i u1000000

Output:

14 717822Y132
fping:

‘fping’ is a network utility designed to send ICMP (Internet Control Message Protocol)
echo requests (pings) to multiple hosts at once, unlike the traditional ping command which
pings one host at a time. This makes fping particularly useful for network administrators who
need to quickly check the availability of multiple hosts in a network.

Ping a Single Host


fping 192.168.1.1

Ping Multiple Hosts


fping 192.168.1.1 192.168.1.2 192.168.1.3

Ping a Range of IPs


fping -g 192.168.1.1 192.168.1.254

Show Only Alive Hosts


fping -a 192.168.1.1 192.168.1.2 192.168.1.3

Ping Indefinitely Until Stopped


fping -l 192.168.1.1

Output:

15 717822Y132
arping:
‘arping’ is a network utility used to discover and probe hosts on a local network using the
Address Resolution Protocol (ARP). It is particularly useful for network administrators and
security professionals for tasks such as network discovery, troubleshooting, and testing

Ping a Host by IP Address:


arping 192.168.1.1

Specify Network Interface:


arping -I eth0 192.168.1.1

Set Number of Requests to Send:


arping -c 5 192.168.1.1

Broadcast ARP Requests:


arping -B 192.168.1.1

Output:

16 717822Y132
Result:
Thus the commands to scan the network for Windows XP and Windows 7 target machines in local
network and virtual network has been done successfully and output is verified.

17 717822Y132

You might also like