Introduction
In this lab, you will learn to perform advanced host discovery using Nmap. Host discovery is the process of identifying active devices on a network. This is a crucial first step in network reconnaissance, helping you understand the network's layout and identify potential targets for further analysis.
You'll explore various Nmap techniques, including:
- TCP Ping Scan (
-PS): Sending TCP SYN packets to specific ports to determine if a host is online and if those ports are open. - UDP Ping Scan (
-PU): Sending UDP packets to specific ports, often used when TCP pings are blocked, to infer host status based on responses or lack thereof. - Skipping Ping Scan (
-Pn): Bypassing Nmap's default host discovery phase, forcing it to assume all target hosts are online and proceed directly to port scanning. - Combining Techniques: Leveraging multiple discovery methods to increase the reliability of host detection, especially in complex network environments with firewalls.
- Saving and Analyzing Results: Storing Nmap output to a file for later review and using basic Linux commands to extract valuable information from the scan results.
Throughout the lab, you'll execute commands like nmap -PS2222,8080 127.0.0.1 for TCP ping scans, nmap -PU5353 127.0.0.1 for UDP ping, and nmap -Pn -oN hosts.txt 127.0.0.1 to save results. These hands-on exercises will enhance your understanding of Nmap's host discovery capabilities and prepare you for real-world network reconnaissance tasks.



