nmap
nmap -sP 208.109.192.1-255
nmap -sP 208.109.9-100.10-236
nmap -sP 208.109.*.*
nmap -sP 192.168.0.1/24
nmap -sn 208.109.190-193.*
nmap -sn 208.109.193.* --exclude 208.109.193.5
sudo nmap --script broadcast-ping 192.168.0.*The flags are -sP and -sn, where -sn is the replacement of the old -sP flag.fping -g 192.168.0.1/24nmap -p0- -v -A -T4 scanme.nmap.org-p0- asks Nmap to scan every possible TCP port,
-v asks Nmap to be verbose about it
-A enables aggressive tests such as remote OS detection, service/version detection, and the Nmap Scripting Engine (NSE). Finally,
-T4 enables a more aggressive timing policy to speed up the scan.White-box / VAPT scenario (the objective is generally to find as many vulnerabilities as possible)
Black-box / Red-team scenario
Last updated