Skip to end of banner
Go to start of banner

Scanning a Subnet with Nmap

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

Scanning a Subnet with Nmap


 

There are a few options for subnet scanning using Nmap. Assuming you have Nmap installed on the Open-AudIT server (and if it's a Windows server, make sure you have the Nmap path in your PATH system variable) you can:

  1. Start an Nmap scan directly from the web interface via Admin -> Discovery -> Discover Subnet.
  2. Use the audit_subnet.(vbs|sh) scripts from the command line.
  3. If you're on Windows, use the audit_subnet_windows.vbs script on the command line.

For all cases you will need to supply a subnet in the standard Nmap format. One of:

  • 192.168.1.1 - single address
  • 192.168.1.0/24 - Subnet
  • 192.168.1-5.1-100 - Range

This is provided to the scripts using the command line option subnet=

You can test the script by setting the debugging level to > 0 also on the command line. debugging=3

The first two options will provide logging to the file open-audit/other/open-audit.log which can be viewed in the web interface by going to Admin -> Logging -> View Log.

You can also output to a file instead of submitting to the web server. On the command line specify submit_online=y create_file=y.

  • No labels