06-17-2011
ping is extremely straightforward. All it does is send one very specific kind of packet to a specific destination and it either goes or it doesn't.
nmap is a whole suite of stuff. There's not an "nmap ping" kind of ping, it's doing a variety of things, and not even the same thing all the time.
Reading through the nmap documentation I find this:
Quote:
For unprivileged Unix shell users, the default probes are a SYN packet to ports 80 and 443 using the connect system call. This host discovery is often sufficient when scanning local networks, but a more comprehensive set of discovery probes is recommended for security auditing.
80 and 443 wouldn't have found your ssh port. Perhaps you should run it as root, so it can do more.
Also try --traceroute in case it's picked some crazy destination instead of the correct interface.
In short, if you can ping and nmap can't, nmap's wrong.
This User Gave Thanks to Corona688 For This Post:
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Dear All ,
Kindly note I have sun solaries 7 .
I want to block a domain who keep sending emails to my domain and users .
thanks (1 Reply)
Discussion started by: tamemi
1 Replies
2. Shell Programming and Scripting
sed -n '/robots.txt/!{s/\(\{1,\}\.*\.*\.*\).*\/\(.*\.txt\).*/\1 \2/p;}' myaapache.log
Above command will search all txt except robots.txt from apache logs and show like
94.136.63.119 idsuper.txt
174.121.67.233 fx29id1.txt
I want to block that ip address automatically, i need script... (1 Reply)
Discussion started by: learnbash
1 Replies
3. UNIX for Advanced & Expert Users
Hi Folks
I have been debugging a script that is called every thirty seconds. Basically it is doing a ps, well two actually, one to file (read by the getline below) and the other into a pipe. The one into the pipe is: -
V_SYSVPS=/usr/sysv/bin/ps
$V_SYSVPS -p$PIDLIST -o$PSARGS... (0 Replies)
Discussion started by: steadyonabix
0 Replies
4. Programming
OS : solaris 10 X86
I created stream socket, tries to connect to port 7 on the remote machine.
After doing the non blocking connect call I did select with time out value is 3 secs. I am always getting timed out though I am writing prior to select.
code:
x=fcntl(S,F_GETFL,0);... (1 Reply)
Discussion started by: satish@123
1 Replies
5. UNIX for Dummies Questions & Answers
I know how to add signal to a set. But what if I want to add 2 or 3 signals to the set.
I know I can use sigaddset (&set,SIGBUS)....but what if I want to add SIGBUS and SIGALRM at once. Do i have to do it like this..
sigaddset (&set,SIGBUS);
sigaddset (&set,SIGALRM);
Is there another way to... (0 Replies)
Discussion started by: joker40
0 Replies
6. Red Hat
Dear all,
I am new to this forum.I need some assistant from you people.
I have a server in which Linux 5 is installed and it is in the network. How i block any user to access my server.. Upto how many users i can block.. send me the procedure....
Thank you in advance...... (10 Replies)
Discussion started by: sudhansu
10 Replies
7. Shell Programming and Scripting
Hi,
I develop simple animation ping script on Solaris Platform. It is like Cisco ping.
Examples and source code are below.
bash-3.00$ gokcell 152.155.180.8 30
Sending 30 Ping Packets to 152.155.180.8
!!!!!!!!!!!!!.!!!!!!!!!!!!!!!.
% 93.33 success... % 6.66 packet loss...... (1 Reply)
Discussion started by: gokcell
1 Replies
8. Shell Programming and Scripting
Hi
I am using perl to ping a list of nodes - with script below :
$p = Net::Ping->new("icmp");
if ($p->ping($host,1)){
print "$host is alive.\n";
}
else {
print "$host is unreacheable.\n";
}
$p->close();... (4 Replies)
Discussion started by: tavanagh
4 Replies
9. Programming
among the below socket programming api's, please let me know which are blocking and non-blocking.
socket
accept
bind
listen
write
read
close (2 Replies)
Discussion started by: VSSajjan
2 Replies
10. Programming
help with bash script!
im am working on this script to make sure my server will stay online, so i made this script..
HOSTS="192.168.138.155"
COUNT=4
pingtest(){
for myhost in "$@"
do
ping -c "$COUNT" "$myhost" &&return 1
done
return 0
}
if pingtest $HOSTS
#100% failed... (4 Replies)
Discussion started by: mort3924
4 Replies
LEARN ABOUT CENTOS
zenmap
ZENMAP(1) Zenmap Reference Guide ZENMAP(1)
NAME
zenmap - Graphical Nmap frontend and results viewer
SYNOPSIS
zenmap [options] [results file]
DESCRIPTION
Zenmap is a multi-platform graphical Nmap frontend and results viewer. Zenmap aims to make Nmap easy for beginners to use while giving
experienced Nmap users advanced features. Frequently used scans can be saved as profiles to make them easy to run repeatedly. A command
creator allows interactive creation of Nmap command lines. Scan results can be saved and viewed later. Saved scan results can be compared
with one another to see how they differ. The results of recent scans are stored in a searchable database.
This man page only describes the few Zenmap command-line options and some critical notes. A much more detailed Zenmap User's Guide is
available at http://nmap.org/book/zenmap.html. Other documentation and information is available from the Zenmap web page at
http://nmap.org/zenmap/.
OPTIONS SUMMARY
-f, --file results file
Open the given results file for viewing. The results file may be an Nmap XML output file (.xml, as produced by nmap -oX) or a Umit scan
results file (.usr). This option may be given more than once.
-h, --help
Show a help message and exit.
-n, --nmap Nmap command line
Run the given Nmap command within the Zenmap interface. After -n or --nmap, every remaining command line argument is read as the
command line to execute. This means that -n or --nmap must be given last, after any other options. Note that the command line must
include the nmap executable name: zenmap -n nmap -sS target.
-p, --profile profile
Start with the given profile selected. The profile name is just a string: "Regular scan". If combined with -t, begin a scan with the
given profile against the specified target.
-t, --target target
Start with the given target. If combined with -p, begin a scan with the given profile against the specified target.
-v, --verbose
Increase verbosity (of Zenmap, not Nmap). This option may be given multiple times to get even more verbosity.
Any other arguments are taken to be the names of results files to open.
ENVIRONMENT VARIABLES
ZENMAP_DEVELOPMENT
Set ZENMAP_DEVELOPMENT to disable automatic crash reporting.
BUGS
Like their authors, Nmap and Zenmap aren't perfect. But you can help make them better by sending bug reports or even writing patches. If
Nmap or Zenmap doesn't behave the way you expect, first upgrade to the latest version available from http://nmap.org. If the problem
persists, do some research to determine whether it has already been discovered and addressed. Try Googling the error message or browsing
the nmap-dev archives at http://seclists.org/. Read this full manual page as well. If nothing comes of this, mail a bug report to
<dev@nmap.org>. Please include everything you have learned about the problem, as well as what version of Zenmap you are running and what
operating system version it is running on. Problem reports and Zenmap usage questions sent to dev@nmap.org are far more likely to be
answered than those sent to Fyodor directly.
Code patches to fix bugs are even better than bug reports. Basic instructions for creating patch files with your changes are available at
https://svn.nmap.org/nmap/HACKING. Patches may be sent to nmap-dev (recommended) or to Fyodor directly.
HISTORY
Zenmap was originally derived from Umit, an Nmap GUI created during the Google-sponsored Nmap Summer of Code in 2005 and 2006. The primary
author of Umit was Adriano Monteiro Marques. When Umit was modified and integrated into Nmap in 2007, it was renamed Zenmap.
AUTHORS
Nmap
Fyodor <fyodor@nmap.org> (http://insecure.org)
Hundreds of people have made valuable contributions to Nmap over the years. These are detailed in the CHANGELOG file which is distributed
with Nmap and also available from http://nmap.org/changelog.html.
Umit
Zenmap is derived from the Umit Nmap frontend, which was started by Adriano Monteiro Marques as an Nmap/Google Summer of Code project
(<py.adriano@gmail.com>, http://www.umitproject.org).
Zenmap 07/28/2013 ZENMAP(1)