Sponsored Content
Full Discussion: ping blocking
Special Forums IP Networking ping blocking Post 302531685 by Corona688 on Friday 17th of June 2011 12:30:23 PM
Old 06-17-2011
ping is extremely straightforward. All it does is send one very specific kind of packet to a specific destination and it either goes or it doesn't.

nmap is a whole suite of stuff. There's not an "nmap ping" kind of ping, it's doing a variety of things, and not even the same thing all the time.

Reading through the nmap documentation I find this:
Quote:
For unprivileged Unix shell users, the default probes are a SYN packet to ports 80 and 443 using the connect system call. This host discovery is often sufficient when scanning local networks, but a more comprehensive set of discovery probes is recommended for security auditing.
80 and 443 wouldn't have found your ssh port. Perhaps you should run it as root, so it can do more.

Also try --traceroute in case it's picked some crazy destination instead of the correct interface.

In short, if you can ping and nmap can't, nmap's wrong.
This User Gave Thanks to Corona688 For This Post:
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

blocking domains

Dear All , Kindly note I have sun solaries 7 . I want to block a domain who keep sending emails to my domain and users . thanks (1 Reply)
Discussion started by: tamemi
1 Replies

2. Shell Programming and Scripting

blocking script help

sed -n '/robots.txt/!{s/\(\{1,\}\.*\.*\.*\).*\/\(.*\.txt\).*/\1 \2/p;}' myaapache.log Above command will search all txt except robots.txt from apache logs and show like 94.136.63.119 idsuper.txt 174.121.67.233 fx29id1.txt I want to block that ip address automatically, i need script... (1 Reply)
Discussion started by: learnbash
1 Replies

3. UNIX for Advanced & Expert Users

ps blocking

Hi Folks I have been debugging a script that is called every thirty seconds. Basically it is doing a ps, well two actually, one to file (read by the getline below) and the other into a pipe. The one into the pipe is: - V_SYSVPS=/usr/sysv/bin/ps $V_SYSVPS -p$PIDLIST -o$PSARGS... (0 Replies)
Discussion started by: steadyonabix
0 Replies

4. Programming

non blocking connect

OS : solaris 10 X86 I created stream socket, tries to connect to port 7 on the remote machine. After doing the non blocking connect call I did select with time out value is 3 secs. I am always getting timed out though I am writing prior to select. code: x=fcntl(S,F_GETFL,0);... (1 Reply)
Discussion started by: satish@123
1 Replies

5. UNIX for Dummies Questions & Answers

Blocking signals

I know how to add signal to a set. But what if I want to add 2 or 3 signals to the set. I know I can use sigaddset (&set,SIGBUS)....but what if I want to add SIGBUS and SIGALRM at once. Do i have to do it like this.. sigaddset (&set,SIGBUS); sigaddset (&set,SIGALRM); Is there another way to... (0 Replies)
Discussion started by: joker40
0 Replies

6. Red Hat

Blocking an IP address

Dear all, I am new to this forum.I need some assistant from you people. I have a server in which Linux 5 is installed and it is in the network. How i block any user to access my server.. Upto how many users i can block.. send me the procedure.... Thank you in advance...... (10 Replies)
Discussion started by: sudhansu
10 Replies

7. Shell Programming and Scripting

Animation Ping on Solaris Like Cisco Ping

Hi, I develop simple animation ping script on Solaris Platform. It is like Cisco ping. Examples and source code are below. bash-3.00$ gokcell 152.155.180.8 30 Sending 30 Ping Packets to 152.155.180.8 !!!!!!!!!!!!!.!!!!!!!!!!!!!!!. % 93.33 success... % 6.66 packet loss...... (1 Reply)
Discussion started by: gokcell
1 Replies

8. Shell Programming and Scripting

How to get reason for ping failure using perls Net::Ping->new("icmp");?

Hi I am using perl to ping a list of nodes - with script below : $p = Net::Ping->new("icmp"); if ($p->ping($host,1)){ print "$host is alive.\n"; } else { print "$host is unreacheable.\n"; } $p->close();... (4 Replies)
Discussion started by: tavanagh
4 Replies

9. Programming

Which are blocking and non-blocking api's in sockets in C ?

among the below socket programming api's, please let me know which are blocking and non-blocking. socket accept bind listen write read close (2 Replies)
Discussion started by: VSSajjan
2 Replies

10. Programming

Ping test sends mail when ping fails

help with bash script! im am working on this script to make sure my server will stay online, so i made this script.. HOSTS="192.168.138.155" COUNT=4 pingtest(){ for myhost in "$@" do ping -c "$COUNT" "$myhost" &&return 1 done return 0 } if pingtest $HOSTS #100% failed... (4 Replies)
Discussion started by: mort3924
4 Replies
ZENMAP(1)						      Zenmap Reference Guide							 ZENMAP(1)

NAME
zenmap - Graphical Nmap frontend and results viewer SYNOPSIS
zenmap [options] [results file] DESCRIPTION
Zenmap is a multi-platform graphical Nmap frontend and results viewer. Zenmap aims to make Nmap easy for beginners to use while giving experienced Nmap users advanced features. Frequently used scans can be saved as profiles to make them easy to run repeatedly. A command creator allows interactive creation of Nmap command lines. Scan results can be saved and viewed later. Saved scan results can be compared with one another to see how they differ. The results of recent scans are stored in a searchable database. This man page only describes the few Zenmap command-line options and some critical notes. A much more detailed Zenmap User's Guide is available at http://nmap.org/book/zenmap.html. Other documentation and information is available from the Zenmap web page at http://nmap.org/zenmap/. OPTIONS SUMMARY
-f, --file results file Open the given results file for viewing. The results file may be an Nmap XML output file (.xml, as produced by nmap -oX) or a Umit scan results file (.usr). This option may be given more than once. -h, --help Show a help message and exit. -n, --nmap Nmap command line Run the given Nmap command within the Zenmap interface. After -n or --nmap, every remaining command line argument is read as the command line to execute. This means that -n or --nmap must be given last, after any other options. Note that the command line must include the nmap executable name: zenmap -n nmap -sS target. -p, --profile profile Start with the given profile selected. The profile name is just a string: "Regular scan". If combined with -t, begin a scan with the given profile against the specified target. -t, --target target Start with the given target. If combined with -p, begin a scan with the given profile against the specified target. -v, --verbose Increase verbosity (of Zenmap, not Nmap). This option may be given multiple times to get even more verbosity. Any other arguments are taken to be the names of results files to open. ENVIRONMENT VARIABLES
ZENMAP_DEVELOPMENT Set ZENMAP_DEVELOPMENT to disable automatic crash reporting. BUGS
Like their authors, Nmap and Zenmap aren't perfect. But you can help make them better by sending bug reports or even writing patches. If Nmap or Zenmap doesn't behave the way you expect, first upgrade to the latest version available from http://nmap.org. If the problem persists, do some research to determine whether it has already been discovered and addressed. Try Googling the error message or browsing the nmap-dev archives at http://seclists.org/. Read this full manual page as well. If nothing comes of this, mail a bug report to <dev@nmap.org>. Please include everything you have learned about the problem, as well as what version of Zenmap you are running and what operating system version it is running on. Problem reports and Zenmap usage questions sent to dev@nmap.org are far more likely to be answered than those sent to Fyodor directly. Code patches to fix bugs are even better than bug reports. Basic instructions for creating patch files with your changes are available at https://svn.nmap.org/nmap/HACKING. Patches may be sent to nmap-dev (recommended) or to Fyodor directly. HISTORY
Zenmap was originally derived from Umit, an Nmap GUI created during the Google-sponsored Nmap Summer of Code in 2005 and 2006. The primary author of Umit was Adriano Monteiro Marques. When Umit was modified and integrated into Nmap in 2007, it was renamed Zenmap. AUTHORS
Nmap Fyodor <fyodor@nmap.org> (http://insecure.org) Hundreds of people have made valuable contributions to Nmap over the years. These are detailed in the CHANGELOG file which is distributed with Nmap and also available from http://nmap.org/changelog.html. Umit Zenmap is derived from the Umit Nmap frontend, which was started by Adriano Monteiro Marques as an Nmap/Google Summer of Code project (<py.adriano@gmail.com>, http://www.umitproject.org). Zenmap 07/28/2013 ZENMAP(1)
All times are GMT -4. The time now is 08:04 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy