Chapter 7. Scanning Large Networks

Note

This chapter shows you how to do some things that in many situations might be illegal, unethical, a violation of the terms of service, or just not a good idea. It is provided here to give you information that may be of use to protect yourself against threats and make your own system more secure. Before following these instructions, be sure you are on the right side of the legal and ethical line... use your powers for good!

In this chapter we will cover:

  • Scanning an IP address range
  • Reading targets from a text file
  • Scanning random targets
  • Skipping tests to speed up long scans
  • Selecting the correct timing template
  • Adjusting timing parameters
  • Adjusting performance parameters
  • Collecting signatures of web servers
  • Distributing ...

Get Nmap 6: Network Exploration and Security Auditing Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.