diff --git a/ex-1_iptables.adoc b/ex-1_iptables.adoc index 7cdb4f4..455bd95 100644 --- a/ex-1_iptables.adoc +++ b/ex-1_iptables.adoc @@ -53,19 +53,52 @@ lo: flags=73 mtu 65536 TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 ---- -.TIP -**** -inet ***172.21.0.2*** netmask 255.255.0.0 broadcast 172.21.255.255 -**** +TIP: inet ***172.21.0.2*** netmask 255.255.0.0 broadcast 172.21.255.255 == Find live hosts .Step 2 (find live hosts on network) [source,bash] ---- -nmap -sP 83.212.114.* +nmap -sP 172.21.0.* + +Nmap scan report for 172.21.0.1 (172.21.0.1) +Host is up (0.00028s latency). +MAC Address: 02:42:56:48:D0:61 (Unknown) +Nmap scan report for testnetwork2_worker_1.testnetwork2_net (172.21.0.3) +Host is up (0.00015s latency). +MAC Address: 02:42:AC:15:00:03 (Unknown) +Nmap scan report for testnetwork2_worker_3.testnetwork2_net (172.21.0.4) +Host is up (0.00018s latency). +MAC Address: 02:42:AC:15:00:04 (Unknown) +Nmap scan report for testnetwork2_worker_4.testnetwork2_net (172.21.0.5) +Host is up (0.00015s latency). +MAC Address: 02:42:AC:15:00:05 (Unknown) +Nmap scan report for testnetwork2_worker_2.testnetwork2_net (172.21.0.6) +Host is up (0.00017s latency). +MAC Address: 02:42:AC:15:00:06 (Unknown) +Nmap scan report for 9110d42e466b (172.21.0.2) + + +nmap -sP 172.21.0.* | grep Nmap | cut -d' ' -f5-6 + +172.21.0.1 (172.21.0.1) +testnetwork2_worker_1.testnetwork2_net (172.21.0.3) +testnetwork2_worker_3.testnetwork2_net (172.21.0.4) +testnetwork2_worker_4.testnetwork2_net (172.21.0.5) +testnetwork2_worker_2.testnetwork2_net (172.21.0.6) +9110d42e466b (172.21.0.2) + ---- +.What is Nmap? +[NOTE] +==== +Nmap, short for Network Mapper, is a free, open-source tool for vulnerability scanning and network discovery. Network administrators use Nmap to identify what devices are running on their systems, discovering hosts that are available and the services they offer, finding open ports and detecting security risks. +==== + + + == Find open Ports .Step 3 (find open ports)