- Applied Network Security
- Arthur Salmon Warun Levesque Michael McLafferty
- 147字
- 2021-07-02 23:31:01
Using a list
Often, we will want to scan a list of IP addresses and not an entire subnet. We can use any text editor and create a list of IP addresses, and then feed this list to Nmap. Here, I am using Leafpad, which is built into Kali (any text editor will work), to put together a list of IP addresses I want to scan:

Then I can use this list of IP address in Nmap rather than having to retype these IP addresses each time I scan. Type pwd to see the working directory. Then we can create our scanlist file there with a text editor. We will be adding 192.168.10.2, 192.168.10.50, 192.168.10.70, 192.168.10.100, and 192.168.10.200. Type nmap -iL scanlist.txt:

As you can see, Nmap scanned all five IP addresses that I listed in my text document, but only found two IP addresses among them.
- 信息安全導論(在線實驗+在線自測)
- 為你護航:網絡空間安全科普讀本(第2版)
- Metasploit Penetration Testing Cookbook(Second Edition)
- Mastering Kali Linux for Advanced Penetration Testing
- 計算機病毒原理與防范(第2版)
- 計算機網絡安全技術研究
- Building a Home Security System with BeagleBone
- 信息安全導論(第2版)
- 隱私計算:推進數據“可用不可見”的關鍵技術
- 華為Anti-DDoS技術漫談
- 復雜信息系統網絡安全體系建設指南
- 計算機網絡安全實驗指導
- 從實踐中學習Nmap滲透測試
- 黑客攻防從入門到精通:實戰篇(第2版)
- 一本書講透混合云安全