No video

Nmap - Host Discovery With Ping Sweep

  Рет қаралды 60,250

HackerSploit

HackerSploit

4 жыл бұрын

In this video, I demonstrate how to perform host discovery on a network with ping sweeps using Nmap. Nmap is a free and open-source network scanner created by Gordon Lyon. Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection.
📈 SUPPORT US:
Patreon: / hackersploit
Merchandise: teespring.com/...
SOCIAL NETWORKS:
Reddit: / hackersploit
Twitter: / hackersploit
Instagram: / hackersploit
LinkedIn: / 18713892
WHERE YOU CAN FIND US ONLINE:
Blog: hsploit.com/
HackerSploit - Open Source Cybersecurity Training: hackersploit.org/
HackerSploit Academy: www.hackersplo...
HackerSploit Discord: / discord
LISTEN TO THE CYBERTALK PODCAST:
Spotify: open.spotify.c...
We hope you enjoyed the video and found value in the content. We value your feedback. If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
#Nmap

Пікірлер: 53
@FalcoGer
@FalcoGer 3 жыл бұрын
For TCP: Open means a service is running (tcp syn ack received) Closed means nmap got a tcp reset message (default behavior as indicated by rfc-whocares) Filtered means the packet was dropped or responded with icmp port unreachable (non standard, indicates packet filtering or network issues) For UDP: Open means that the request got a response (uncommon, but you know something is running) Open | Filtered means that you got no response (since udp doesn't respond typically nmap can't determine if the packet was dropped or got through) Closed | Filtered means you got an icmp port unreachable (default response for non existing services, or perhaps firewall rule)
@zoozeezoozee6726
@zoozeezoozee6726 3 жыл бұрын
Fully explained everything. Thank you sir
@arkfitness1151
@arkfitness1151 3 жыл бұрын
I am learning from your videos
@jamesdickson3631
@jamesdickson3631 4 жыл бұрын
A big shout to Hackerspoilt
@arkfitness1151
@arkfitness1151 3 жыл бұрын
There are very few real hacking channels on KZbin your are one of those
@gentlewolf2749
@gentlewolf2749 3 жыл бұрын
your videos are helpful sir. keep making more. clearly explained
@ZTechSecurity
@ZTechSecurity Жыл бұрын
Don't use `-sn` without `sudo` otherwise it will scan 80, 443 ports to detect the host and if there is a firewall on the other end host will not be detected, and that method is slower for host detection Tips to detect every host: 1. use sudo with `nmap -sn ` (uses ARP scan, which is fast as well) 2. use `nmap -sL | grep \)` (it will use rDNS lookup technique, so nmap don't send request to the host directly) OR use -Pn with -sn `nmap -Pn -sn | grep \)` (uses rDNS technique like -sL) use --packet-trace with every command to see the packets.
@bhaskarbhar237
@bhaskarbhar237 9 ай бұрын
For me only the ip address is shown not the host name. Example: Samsung-A32 all that stuff? How to resolve it?
@therealsuryansh
@therealsuryansh 4 жыл бұрын
Sir! Keep making more videos. I have learnt a lot.
@Chris-ez1ly
@Chris-ez1ly 2 жыл бұрын
Great video! Thank you!
@m-samik
@m-samik 4 жыл бұрын
Your Videos are 🔥 and we learn a lot from them 💕
@arkfitness1151
@arkfitness1151 3 жыл бұрын
Keep the good work
@maniac3292
@maniac3292 4 жыл бұрын
relly appriciate ur work mate...💓
@yigitaktas715
@yigitaktas715 3 жыл бұрын
great video
@theexecutioner8784
@theexecutioner8784 2 жыл бұрын
Hey can you make vedio about connecting a wifi adaptor to virtual box
@hyperlight3092
@hyperlight3092 3 жыл бұрын
Tnx !
@waffle3632
@waffle3632 2 жыл бұрын
So I guess I just have bad luck and I cannot get results with my home network. I have direct tv and their default router. But even if I use nmap on it. It won't tell me the manufacturer or any connected devices which blows when trying to learn tools by hacking my own equipment.
@r4d1calwr4th7
@r4d1calwr4th7 4 жыл бұрын
pretty gud sir...
@fabrykoll9218
@fabrykoll9218 2 жыл бұрын
Why when I use Nmap -sn it do not give Mac address?
@AjayKumar-je2lk
@AjayKumar-je2lk 4 жыл бұрын
u can simply run nmap -T4 -p- -A (ip address)
@patelgaurav4808
@patelgaurav4808 4 жыл бұрын
I have try to do my network scan but it's not showing name and the all users also ? What should I do?
@homelander4881
@homelander4881 Жыл бұрын
Hey everyone. *Smartphones in my network won't show during the scan.* ANYONE HELP..
@drboom9041
@drboom9041 4 жыл бұрын
Sir u r great
@prajeeshnair4949
@prajeeshnair4949 4 жыл бұрын
@HackerSploit - Question: How do you I perform a nmap sweep to identify live hosts in a network when all I have is an IPv6 address?
@diru424
@diru424 3 жыл бұрын
Nmap -6 [target ipv6 adress] This is the command you may use to perform a default ipv6 port scan. You can't scan multiple hosts in a single command as its pointless in this context. So if you have to scan a network of systems and you only have their ipv6 addresses you may do that by creating a list of all ipv6 addresses you have and scanning them using the following command. Nmap -6 -iL -sn list.txt I havent worked on ipv6 either but i hope this helps, please let us know if this solves your porblem.. Peace
@ryaddraou851
@ryaddraou851 4 жыл бұрын
hi tkx for the video, but one question plz can we scan a network even if the firewall bloc the ports ? if yes how and can we bypass the firewall rules ?
@zarbabfarooq8248
@zarbabfarooq8248 2 жыл бұрын
exactly the same question I wanted to ask?
@travelwithwolves7243
@travelwithwolves7243 2 жыл бұрын
What if the target is in on different network
@abdallahusman5963
@abdallahusman5963 4 ай бұрын
hello please I need help, I am a beginner in using nmap. I don't know what the problem is, if I try to scan an IP, it sends a message that host seems down, if it is really up, but blocking our ping probes, try -Pn. please what should I do to solve this?
@saurabhsharma1221
@saurabhsharma1221 4 жыл бұрын
There are lot of version and gui alternative of nmap
@anshajkumar6542
@anshajkumar6542 4 жыл бұрын
Zenmap being one
@saurabhsharma1221
@saurabhsharma1221 4 жыл бұрын
@@anshajkumar6542 correct
@tayabfarooq7544
@tayabfarooq7544 3 жыл бұрын
Which operating system are you using? And what type of the cmd you have used??
@8080VB
@8080VB 3 жыл бұрын
Kali with terminal
@ShajuCruz
@ShajuCruz Жыл бұрын
i tried but "Failed to resolve/decode supposed IPv4 source address "n": Name or service not known QUITTING!" this will arise
@mohamedkarmadi560
@mohamedkarmadi560 4 жыл бұрын
How to use a port i would like to know how to
@8080VB
@8080VB 3 жыл бұрын
Scan your network find what ports are open
@marouaneakassab
@marouaneakassab 4 жыл бұрын
Niice
@piyushdutta8752
@piyushdutta8752 4 жыл бұрын
What vulnerable machine is he using is it metasploitable ??
@8080VB
@8080VB 3 жыл бұрын
Yh , n also meta 3 ~ win2008
@gopimanideepreddy5325
@gopimanideepreddy5325 4 жыл бұрын
Sir please make videos about bugbounty haunting in hackerone. Com site
@sunmoonstarkiwi
@sunmoonstarkiwi 3 жыл бұрын
Can you make your text zoomed It's so hard to view this on mobile
@Jawlaya
@Jawlaya 4 жыл бұрын
👍🏾👍🏾👍🏾
@ARUNS-om5ng
@ARUNS-om5ng 4 жыл бұрын
Sir,how to protect from hacking ?
@BloodmansCrypt
@BloodmansCrypt 4 жыл бұрын
Get a good antivirus, don't fall for phishing scams, get a VPN
@mazpr2025
@mazpr2025 4 ай бұрын
LOL
@arkfitness1151
@arkfitness1151 3 жыл бұрын
Anymouse out
@kernelpanicatthedisco1604
@kernelpanicatthedisco1604 4 жыл бұрын
First again
Nmap - OS And Service Version Scanning
10:02
HackerSploit
Рет қаралды 49 М.
Bypassing Firewalls With PING!
17:40
Tall Paul Tech
Рет қаралды 80 М.
Kids' Guide to Fire Safety: Essential Lessons #shorts
00:34
Fabiosa Animated
Рет қаралды 12 МЛН
Jumping off balcony pulls her tooth! 🫣🦷
01:00
Justin Flom
Рет қаралды 34 МЛН
Алексей Щербаков разнес ВДВшников
00:47
小丑把天使丢游泳池里#short #angel #clown
00:15
Super Beauty team
Рет қаралды 33 МЛН
Nmap - Firewall Evasion (Decoys, MTU & Fragmentation)
13:55
HackerSploit
Рет қаралды 87 М.
Solving a REAL investigation using OSINT
19:03
Gary Ruddell
Рет қаралды 156 М.
Nmap - Output And Verbosity
13:39
HackerSploit
Рет қаралды 20 М.
Use Nmap for Tactical Network Reconnaissance [Tutorial]
17:36
Null Byte
Рет қаралды 296 М.
Nmap - FTP Enumeration
11:56
HackerSploit
Рет қаралды 35 М.
Nmap - Inverse TCP Flag Scanning (FIN, XMAS & NULL)
13:23
HackerSploit
Рет қаралды 31 М.
ARP Poisoning | Man-in-the-Middle Attack
11:35
CertBros
Рет қаралды 267 М.
TailsOS Guide For The Ultra Paranoid
35:32
Mental Outlaw
Рет қаралды 418 М.
Nmap - Firewall Detection (ACK Probing)
7:14
HackerSploit
Рет қаралды 60 М.
Nmap Tutorial to find Network Vulnerabilities
17:09
NetworkChuck
Рет қаралды 2,7 МЛН
Kids' Guide to Fire Safety: Essential Lessons #shorts
00:34
Fabiosa Animated
Рет қаралды 12 МЛН