Find out when servers and services come online anywhere on your network
If you haven't used it before, nmap is a tremendously useful tool for identifying machines and services on your network. It will perform a number of different types of network scanning (from standard TCP and UDP to more exotic scans like stealth TCP SYN scans, Xmas Tree and NULL probes, and a bunch of other fun options).
Even more interesting is the OS fingerprinting code, which analyzes packets returned by the target machine and compares the results against a database of known operating systems. This is a fascinating bit of code, in that it can typically identify the remote side's operating system without connecting to any actual services, and even return an estimated uptime for the machine being scanned.
To perform a standard port sweep with OS fingerprinting, try the -O switch:
rob@catlin:~# nmap -O caligula Starting nmap V. 3.00 ( www.insecure.org/nmap/ ) Interesting ports on caligula.rob.nocat (10.42.4.7): (The 1600 ports scanned but not shown below are in state: closed) Port State Service 22/tcp open ssh Remote operating system guess: Mac OS X 10.1 - 10.1.4 Uptime 5.760 days (since Tue Sep 3 19:14:36 2002) Nmap run completed -- 1 IP address (1 host up) scanned in 31 seconds
If you'd like to nmap your entire network and have a bit of time to kill, you can specify a network and subnet on the command line. This performs a TCP SYN scan and fingerprinting for ...