nmap¶
nmap allows to scan for the hosts, open ports and other
details in a network. It’s required that you have the nmap
binary present
in your PATH.
Note
Certain nmap options require you to use root privileges to run.
nmap.generic.cmd¶
As default -oX
is used for all scans.
Usage details:
ef> run nmap.generic.cmd -h
Example:
Scan the local network 192.168.0.0/24 with -sP
to skip the port scan part.
ef> run nmap.generic.cmd -a "-sP 192.168.0.0/24"
[...]
[+] nmap arguments = (-sP 192.168.0.0/24)
[+] nmaprun:
[+] @scanner: nmap
[+] @args: nmap -oX - -sP 192.168.0.0/24
[+] @start: 1599642315
[+] @startstr: Wed Sep 9 11:05:15 2020
[+] @version: 7.80
[+] @xmloutputversion: 1.04
[+] verbose:
[+] @level: 0
[+] debugging:
[+] @level: 0
[+] host:
[+] status:
[+] @state: up
[+] @reason: arp-response
[+] @reason_ttl: 0
[+] address:
[+] @addr: 192.168.0.1
[+] @addrtype: ipv4
[+] @addr: 90:55:21:12:6E:DD
[+] @addrtype: mac
[+] @vendor: affolter engineering networks
[+] hostnames: None
[...]
[+] Test nmap.generic.cmd passed