nmap
Example #1: Ping scan
nmap -sP 208.109.192.1-255
nmap -sP 208.109.9-100.10-236
nmap -sP 208.109.*.*
nmap -sP 192.168.0.1/24
nmap -sn 208.109.190-193.*
nmap -sn 208.109.193.* --exclude 208.109.193.5
sudo nmap --script broadcast-ping 192.168.0.*
The flags are -sP and -sn, where -sn is the replacement of the old -sP flag.
fping also an option
fping -g 192.168.0.1/24
Example #2: Agressive scan
nmap -p0- -v -A -T4 scanme.nmap.org
-p0- asks Nmap to scan every possible TCP port,
-v asks Nmap to be verbose about it
-A enables aggressive tests such as remote OS detection, service/version detection, and the Nmap Scripting Engine (NSE). Finally,
-T4 enables a more aggressive timing policy to speed up the scan.
-O (Enable OS detection)
White-box / VAPT scenario (the objective is generally to find as many vulnerabilities as possible)
nmap -n -Pn -sS -p0-65535 -oA output <IP-ADDRESS>
Black-box / Red-team scenario
The objective here is not anymore to find as many vulnerabilities as possible, but to achieve full coverage.
nmap -T2 -n -Pn -sS -p0-65535 -oA output <IP-ADDRESS>
Online tools to identify CDN
There are number of online tools that can help us determine whether a particular website is using CDN or not. Here are some of the free ones:
Manual way to identify CDN
host -t A www.example.com
whois <IP-ADDRESS>
Last updated
Was this helpful?