You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

Scanning a Subnet with Nmap


 

There are a few options for subnet scanning using Nmap. Assuming you have Nmap installed on the Open-AudIT server (and if it's a Windows server, make sure you have the Nmap path in your PATH system variable) you can:

  1. Start an Nmap scan directly from the web interface via Admin -> Discovery -> Discover Subnet.
  2. Use the audit_subnet.(vbs|sh) scripts from the command line.
  3. If you're on Windows, use the audit_subnet_windows.vbs script on the command line.

For all cases you will need to supply a subnet in the standard Nmap format. One of:

  • 192.168.1.1 - single address
  • 192.168.1.0/24 - Subnet
  • 192.168.1-5.1-100 - Range

This is provided to the scripts using the command line option subnet=

You can test the script by setting the debugging level to > 0 also on the command line. debugging=3

The first two options will provide logging to the file open-audit/other/open-audit.log which can be viewed in the web interface by going to Admin -> Logging -> View Log.

You can also output to a file instead of submitting to the web server. On the command line specify submit_online=y create_file=y.

  • No labels