From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on sa.int.altlinux.org X-Spam-Level: X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00 autolearn=unavailable version=3.2.5 Date: Fri, 29 Jan 2010 14:23:20 +0300 From: Sergey Vlasov To: community@lists.altlinux.org Message-ID: <20100129112320.GC4905@newmaster.mivlgu.local> Mail-Followup-To: community@lists.altlinux.org References: <596117512.20100129084122@Bk.Ru> <1567198547.20100129112854@Bk.Ru> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="lMM8JwqTlfDpEaS6" Content-Disposition: inline In-Reply-To: <1567198547.20100129112854@Bk.Ru> Subject: Re: [Comm] Scan network X-BeenThere: community@lists.altlinux.org X-Mailman-Version: 2.1.12 Precedence: list Reply-To: ALT Linux Community general discussions List-Id: ALT Linux Community general discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 29 Jan 2010 11:23:36 -0000 Archived-At: List-Archive: List-Post: --lMM8JwqTlfDpEaS6 Content-Type: text/plain; charset=koi8-r Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Fri, Jan 29, 2010 at 11:28:54AM +0300, MisHel64 wrote: > > nmap -n -sP '192.168.1.0/24' =E5=DD=A3 =C5=D3=D4=D8 fping. > =F3=D0=C1=D3=C9=C2=CF, =D0=CF=DE=D4=C9 =D4=CF =DE=D4=CF =CE=D5=D6=CE=CF. > =EE=CF =D1 =CE=C5=CD=CE=CF=C7=CF =CE=C5 =D0=CF=CE=C9=CD=C1=C0. -sP =CF= =DA=CE=C1=DE=C1=C5=D4 =D3=CB=C1=CE=C9=D2=CF=D7=C1=D4=D8 =D3 =D0=CF=CD=CF=DD= =D8=C0 =D0=C9=CE=C7=C1, =D4=CF > =C5=D3=D4=D8 =C2=D5=C4=D5=D4 =CE=C1=CA=C4=C5=CE=D9 =D4=CF=CC=D8=CB=CF = =D4=C5 =C8=CF=D3=D4=D9, =CB=CF=D4=CF=D2=D9=C5 =CF=D4=D7=C5=DE=C1=C0=D4 =CE= =C1 =D0=C9=CE=C7. =EE=CF! > =F3=CB=C1=CE=C9=D2=D5=C0 =CF=C4=CE=D5 =CC=CF=CB=C1=CC=CB=D5, =D7=D3=C5= =CE=C1=CA=C4=C5=CE=D9 =C8=CF=D3=D4=D9 =D0=C9=CE=C7=D5=C0=D4=D3=D1. =F0= =CF =C9=C4=C5=C5 =D4=C1=CB =C9 > =C4=CF=CC=D6=CE=CF =C2=D9=D4=D8. >=20 > =F3=CB=C1=CE=C9=D2=D5=C0 =D7=D4=CF=D2=D5=C0 =CC=CF=CB=C1=CC=CB=D5, =CE=C9= =CF=C4=C9=CE =C9=DA =CE=C1=CA=C4=C5=CE=CE=D9=C8 =C8=CF=D3=D4=CF=D7 =CE=C5 = =D0=C9=CE=C7=D5=C5=D4=D3=D1. >=20 > =FE=C5=CD =D3=CF=C2=C1=CB=C1 =D0=CF=D2=D9=CC=C1=D3=D8? nmap -sP =C9=D3=D0=CF=CC=D8=DA=D5=C5=D4 =CE=C5 =D4=CF=CC=D8=CB=CF ICMP Echo= Request (=CF=D4=D7=C5=D4=D9 =CE=C1 =CB=CF=D4=CF=D2=D9=CA =D7=CF =CD=CE=CF=C7=C9=C8 =D3=CC=D5=DE=C1=D1=C8 =DA=C1=C2=CC=CF=CB=C9=D2=CF=D7=C1= =CE=D9): The -sP option sends an ICMP echo request, TCP SYN to port 443, TCP ACK to port 80, and an ICMP timestamp request by default. When executed by an unprivileged user, only SYN packets are sent (using a connect call) to ports 80 and 443 on the target. When a privileged user tries to scan targets on a local ethernet network, ARP requests are used unless --send-ip was specified. The -sP option can be combined with any of the discovery probe types (the -P* options, excluding -PN) for greater flexibility. If any of those probe type and port number options are used, the default probes are overridden. When strict firewalls are in place between the source host running Nmap and the target network, using those advanced techniques is recommended. Otherwise hosts could be missed when the firewall drops probes or their responses. --lMM8JwqTlfDpEaS6 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (GNU/Linux) iD8DBQFLYsUoW82GfkQfsqIRAqpfAKCR3ZCwQLUeI3P+sfW78G+3+BpRtACcDMT0 qGQcn44C+5X9m7jfNtW2txs= =2ZEk -----END PGP SIGNATURE----- --lMM8JwqTlfDpEaS6--