IncidentResponsev2

Create Active IP List

Task Create Active IP List

2.04 – Active_Host_and_Service_Enumeration
2.01 – Create a list of active IP addresses
2.05 – Create a list of active IP addresses with key ports included
2.07 – Scan ICS Equipment Ports
2.06 – Scan all ports of all hosts on given network segment

Conditions

Given a suspected compromised network segment(s), access to a system that can access and scan the identified network segment(s), and network scanning software included in the team’s incident response kit.

Operator Note: Before scanning, confirm ROE (Rules of Engagement) and authorization from network owner or mission lead. If ICS/SCADA involved, scanning may need to be coordinated and approved.

Standards

Operator Note: Use timestamped filenames and document scan scope (date, network, target ranges) for later validation and correlation.

End State

All active hosts, ports and services are carefully enumerated based on the specific sub-task accomplished and any anomalies or mis-configurations are identified.

Operator Note: Review scan results with NetOps or SysAdmins to clarify unknown hosts or services and avoid false positives.

Manual Steps

A list of IP ranges can be provided by using the -f IPRanges option; otherwise, a range can be specified with -i IPRange.

For each BD, the script will need to be ran.
The script will need to be marked executable before running:

chmod +x NmapScript.sh
1. 2.04 – Active_Host_and_Service_Enumeration
2. 2.01 – Create a list of active IP addresses
3. 2.05 – Create a list of active IP addresses with key ports included
4. 2.07 – Scan ICS Equipment Ports
5. 2.06 – Scan all ports of all hosts on given network segment
6. Exit

Selection:> 1
Selection:> 1
[+] Starting Nmap 7.80 ( https://nmap.org ) at 2020-06-26 13:47 EDT
[+] Nmap scan report for 192.168.69.2
[+] Host is up (0.00084s latency).
[+] Not shown: 999 closed ports
[+] PORT   STATE SERVICE VERSION
[+] 53/tcp open  domain  dnsmasq 2.55
[+] MAC Address: 00:50:56:EB:3D:1D (VMware)
[+] Service detection performed.
[+] Nmap done: 256 IP addresses (6 hosts up) scanned in 17.23 seconds
Selection:> 2
[+] 192.168.69.1 is live!
[+] 192.168.69.2 is live!
[+] 192.168.69.142 is live!
[+] 192.168.69.254 is live!
[+] 192.168.69.132 is live!
[+] 192.168.69.137 is live!
Selection:> 3
[+] Starting Nmap 7.80 ( https://nmap.org ) at 2020-06-26 13:56 EDT
[+] Nmap done: 256 IP addresses (6 hosts up) scanned in 3.41 seconds
Selection:> 4
[!] It is possible for Scada devices to fail with an Nmap scan, do you want to continue? Y
[+] Starting Nmap 7.80 ( https://nmap.org ) at 2020-06-26 13:59 EDT
[+] Nmap done: 256 IP addresses (6 hosts up) scanned in 3.41 seconds
Selection:> 5
[+] Starting Nmap 7.80 ( https://nmap.org ) at 2020-06-26 14:01 EDT
[+] Nmap done: 256 IP addresses (6 hosts up) scanned in 3.41 seconds

Dependencies

sudo apt install nmap

Operator Note: On Windows, use Nmap installer or choco install nmap.

Other available tools

Operator Note: Validate licensing and environment compatibility before using third-party tools.

References

NMAP Site
LAN Spy
NMAP Man Pages
Nmap Network Scanning Book


Operator Recommendations and Additional Tools

Operator Checklist

Tools by Platform

Platform Tool Purpose
Universal Nmap, NmapScript.sh Primary active IP discovery
Windows PowerShell Test-Connection Alternate ping sweep
Linux/macOS arp-scan Lightweight local discovery
Mobile Fing Lightweight subnet scan

Alternate Commands

Linux ARP scan:

sudo arp-scan --interface=eth0 --localnet

Linux Bash simple ping sweep:

for ip in $(seq 1 254); do ping -c 1 192.168.1.$ip | grep "bytes from"; done

Best Practices


Revision History

Date Version Description Author
2025-05-02 1.1 Finalized version with revision history moved Leo