Linux - NetworkingThis forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
so you basically want to ping scan the network to test which machines are up.
you can do this with nmap. make sure nmap is installed, then read "man nmap"
for example....
nmap -sP -T Insane 192.168.0-255.0-255
will ping scan all IP's from 192.168.0.0 to 102.168.255.255
nmap is a great tool for finding security holes in your system...
its also one of the first steps an attacker may use to compromise a system...
its very good at detecting what servers are running, what software and what version.
if you start port scanning other people, they will think you intend to attack there system.
im just saying,,, dont port scan a computer that doesnt belong to you !
even if you dont have any bad intentions, it will be annnoying for any1 who needs to read the firewall logs.
Distribution: Debian, Suse, Knoppix, Dyna:bolic, Mandrake [couple of years ago], Slackware [1993 or so]
Posts: 150
Rep:
Quote:
Originally posted by qwijibow
even if you dont have any bad intentions, it will be annnoying for any1 who needs to read the firewall logs.
Now I just wonder if nmap can detect ports and programs why not turn the issue around. Detecting a portscan and feed back shitty information. Is there something like this about for all the common scanners? I mean if nmap etc can detect apache 1.3.6/bind 9 etc a reverse program could detect an nmap finger print and have some fun.
suppose it could be done... but after your security program detects a port scan, it would have to kill all your servers so that it can have sontroll over the ports they listen too...
then bringing down a server would be as easy as port scanning it....
there wouldnt be any need for dstributed denial of serive attacks.
stupid idea.
it would be much better to just block an IP for 10 mins if it starts a port scan.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.