Host discovery
Host discovery means visualizing the target network architecture and structure using the discovered hosts and network devices.
Network Monitoring
#!/bin/bash
mkdir /opt/nmap_diff
d=$(date +%Y-%m-%d)
y=$(date -d yesterday +%Y-%m-%d)
/usr/bin/nmap -T4 -oX /opt/nmap_diff/scan_$d.xml 10.100.100.0/24 >
/dev/null 2>&1
if [ -e /opt/nmap_diff/scan_$y.xml ]; then
/usr/bin/ndiff /opt/nmap_diff/scan_$y.xml /opt/nmap_diff/scan_$d.xml >
/opt/nmap_diff/diff.txt
fiRemote Discovery
You can use nmap, masscan or unicorn scan for this:
nmap -sn -T4 -oG 192.168.1.1/24 | grep “Status: Up” | cut -f 2 -d ‘ ‘ > LiveHosts.txt
nmap –PE –sn -n 10.50.96.0/23 –oX /root/Desktop/scan.xmlExtracting Live IPs from Nmap Scan
Simple Port Knocking
DNS lookups, Zone Transfers & Brute-Force
Local Discovery
Netdiscover
Options:
Active Mode (Run as an ARP scanner)
Passive Mode (Run as an ARP sniffer)
Parsable Outputs
Responder
Bettercap
Traceroute
Linux traceroute
Linux traceroute sends packets to target with varying TTLs in the IP header. by default sends UDP packets with incrementing destination ports starting from port 33434 going up by one port for each probe packet sent ( each hope measured three times ).
Here are some of the most used options:
Windows traceroute
Sends ICMP echo request messages to target, starting with small TTLs.
Web based traceroute services
Instead of tracing from your address to target various websites allow you to trace from them to the target.
So you can traceroute from around the world. by domain name or IP address. this is very useful in seeing if you are being shunned during a test.
Network Mapping
Traceroute

Zenmap
Last updated

