Starting Nmap 6.00 ( http://nmap.org ) at 2015-06-12 08:49 CEST
route_dst_netlink: can't find interface "venet0"
Starting Nmap 6.00 ( http://nmap.org ) at 2015-06-12 08:49 CEST
I cannot figure out what source address to use for device venet0, does it even exist?
QUITTING!
venet0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 inet addr:127.0.0.2 P-t-P:127.0.0.2 Bcast:0.0.0.0 Mask:255.255.255.255 inet6 addr: 1234:abcd:12:123::1234/56 Scope:Global UP BROADCAST POINTOPOINT RUNNING NOARP MTU:1500 Metric:1 RX bytes:275006352 (262.2 MiB) TX bytes:2082405468 (1.9 GiB) venet0:0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 inet addr:VM.public.IP.address P-t-P:VM.public.IP.address Bcast:VM.public.IP.broadcastAddress Mask:255.255.255.0 UP BROADCAST POINTOPOINT RUNNING NOARP MTU:1500 Metric:1So : yes, they exist, dude !
Starting Nmap 6.00 ( http://nmap.org ) at 2015-06-12 08:49 CEST
I cannot figure out what source address to use for device venet0:0, does it even exist?
QUITTING!
Starting Nmap 6.00 ( http://nmap.org ) at 2015-06-12 08:50 CEST INTERFACES: NONE FOUND(!) ROUTES: NONE FOUND(!)
Starting Nmap 6.00 ( http://nmap.org ) at 2015-06-12 08:50 CEST INTERFACES: NONE FOUND(!) ROUTES: NONE FOUND(!)
target | by IP | by name |
---|---|---|
single host | 192.168.0.1 | www.example.com |
multiple hosts |
|
foo.tld bar.tld baz.tld |
subnet |
|
Option | Obsolete option | Usage |
---|---|---|
Host discovery (1, 2) | ||
-n / -R | disable / force Reverse DNS lookup (default is "sometimes") | |
-Pn (1, 2) | -P0 -PN | Treat all hosts as online, i.e. skip host discovery |
-PR | ARP scan. This method is useful because upon receiving answers to ARP requests, nmap knows an online host is there and need not pinging it (which may be blocked/disabled anyway) | |
-sL (1) | List hosts of a subnet and perform DNS resolution when possible. This method doesn't ping / scan any host. |
|
-sn (1, 2) | -sP | No port scan, i.e. discover hosts but do not run a port scan afterwards. This method :
|
Scan techniques | ||
-sA | TCP ACK scan | |
-sO (uppercase o ) |
IP Protocol scan : report about supported IP protocols rather than listening ports
Requires root privileges
|
|
-sT | TCP connect() scan, used to check for open TCP ports
TCP SYN -sS (if available) is usually a better choice |
|
-sU | UDP scan | |
Port specification and scan order | ||
-p portNumber | probe the portNumber port
|
|
OS detection | ||
-O (uppercase o ) |
Enable OS detection | |
Output | ||
--open | Only show open (or possibly open) ports | |
-v -vv | increase verbosity |
[0-9]$
'Nmap scan report for 192.168.1.1 Host is up (0.0042s latency). Nmap scan report for 192.168.1.8 Host is up (0.0089s latency). Nmap scan report for 192.168.1.103 Host is up (0.000086s latency). Nmap done: 256 IP addresses (3 hosts up) scanned in 15.51 seconds
Nmap scan report for 192.168.1.1 Host is up (0.0042s latency). MAC Address: 58:90:43:12:91:48 (Sagemcom Broadband SAS) Nmap scan report for 192.168.1.8 Host is up (0.0064s latency). MAC Address: DC:A6:32:B8:03:7B (Raspberry Pi Trading) Nmap scan report for 192.168.1.103 Host is up. Nmap done: 256 IP addresses (3 hosts up) scanned in 18.17 seconds