On March 18, 2013, Michael A. Ray wrote: > Good advice from Tim there. I didn'tt know about nmap and I've > just grabbed it. It's more or less the de facto swiss army knife for finding things on a network. I tend to use two different modes most of the time: 1) find out what is on the network and responding to pings: nmap -sP 192.168.1.0/24 (note the capital "P") 2) find out what services a host (or multiple hosts, if you use CIDR notation as above) has open: nmap -p1-1024,8000,8080,8888 192.168.1.42 This will scan ports 1 through 1024 (the "privileged" or "server" ports) as well as common "alternate" web-server ports. There's also a mode that it can sniff what type of server it is (Linux, BSD, Windows, etc; along with some details about their versions) or what versions of certain software might be running (such as "Apache v2.1"). Lastly, use it with care, as some ISPs detect the abusive use of nmap and may ding you for using it. So stick to scanning machines/networks that you own or have permission to scan. Don't go scanning the whole internet. -tim =========================================================== The raspberry-vi mailing list Archives: //www.freelists.org/archives/raspberry-vi Administrative contact: <mike.ray@xxxxxxxxxxxxxx> ----------------------------------------------------------- Raspberry Pi and the Raspberry Pi logo are trademarks of the Raspberry Pi Foundation. This list is not affiliated to the Raspberry Pi Foundation and the views and attitudes expressed by the subscribers to this list do not reflect those of the Foundation. Mike Ray, list creator, January 2013