Jump to content

Recommended Posts

Posted

So, one thing that I have ran into lately is extremely large networks. Often its a 10.0.0.0/8 255.0.0.0 network that I am pretty sure is used to just deter networking scanning and host discovery. Does anyone have any advice for scanning networks this size?

Posted (edited)

Masscan. Will scan very quickly. Can miss some ports, but general network discovery, it works. Also, nmap, can do it quickly, if you add -n (no dns) and only scan for hardware, ie: arp sweep for nodes only, no ports. Then you can individually port scan each one if needed after you get a list of nodes, just use nmap to output to greppable format to save to file, which can then be scanned with masscan import for port scanning, or just use nmap. If using nmap specifically, be sure to set timeouts, just add -v --open, to catch open ports, as timeouts won't show found ports without it at the end of the scan.

Edited by digip
Posted

Nmap -sP 10.0.0.

Simply ping.

 

Nmap -sS -p 80 -oX scan.xml

This will tcp syn connect scan, only a single port and save it as a xml document. With a large list of host i then import this xml document into metasploit, this will allow me to perform a scan on all host that are online. With metasploit you can do more nmap scanning and set your host list to all clients discovered in the xml or only a select group that match a filter or string of your choice.

 

 

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...