2.04 – Active_Host_and_Service_Enumeration
2.01 – Create a list of active IP addresses
2.05 – Create a list of active IP addresses with key ports included
2.07 – Scan ICS Equipment Ports
2.06 – Scan all ports of all hosts on given network segment
Given a suspected compromised network segment(s), access to a system that can access and scan the identified network segment(s), and network scanning software included in the team’s incident response kit.
Operator Note: Always verify network access rules, ROE, and mission owner authorization before performing active scans. In critical infrastructure environments, scanning may cause disruption.
Operator Note: Service identification scans can be noisy. When possible, use timing options in Nmap to reduce network load during production hours.
All active hosts, ports and services are carefully enumerated based on the specific sub-task accomplished and any anomalies or mis-configurations are identified.
Operator Note: After scanning, work with mission partner system administrators to validate unknown or unauthorized services.
A list of IP ranges can be provided by using the -f IPRanges
option; otherwise, a range can be specified with -i IPRange
. For each BD, the script will need to be ran.
The script will need to be marked executable before running:
chmod +x NmapScript.sh
1. 2.04 – Active_Host_and_Service_Enumeration
2. 2.01 – Create a list of active IP addresses
3. 2.05 – Create a list of active IP addresses with key ports included
4. 2.07 – Scan ICS Equipment Ports
5. 2.06 – Scan all ports of all hosts on given network segment
6. Exit
Selection:> 1
Selection:> 1
[+] Starting Nmap 7.80 ( https://nmap.org ) at 2020-06-26 13:47 EDT
[+] Nmap scan report for 192.168.69.2
[+] Host is up (0.00084s latency).
[+] Not shown: 999 closed ports
[+] PORT STATE SERVICE VERSION
[+] 53/tcp open domain dnsmasq 2.55
[+] MAC Address: 00:50:56:EB:3D:1D (VMware)
[+] Service detection performed.
[+] Nmap done: 256 IP addresses (6 hosts up) scanned in 17.23 seconds
Selection:> 2
[+] 192.168.69.1 is live!
[+] 192.168.69.2 is live!
[+] ...
Selection:> 3
[+] Starting Nmap 7.80 ( https://nmap.org )
[+] Nmap done: 256 IP addresses (6 hosts up) scanned in 3.41 seconds
Selection:> 4
[!] It is possible for Scada devices to fail with an Nmap scan, do you want to continue? Y
[+] Starting Nmap...
[+] Nmap done
Selection:> 5
[+] Starting Nmap...
[+] Nmap done
Operator Note: Always carefully check NmapScript.txt logs for errors and complete scan information.
sudo apt install nmap
Operator Note: Ensure Nmap is latest stable version for best service fingerprinting accuracy.
Operator Note: Validate use of third-party scanning tools in mission environments before installation.
NMAP Site
LAN Spy
NMAP Man Pages
Nmap Network Scanning Book
Platform | Tool | Purpose |
---|---|---|
Universal | Nmap + NmapScript.sh | Primary host and service enumeration |
Windows | Netcat | Manual port testing and banner grabbing |
Linux/macOS | masscan | High-speed port scanning |
Mobile | Fing | Basic service discovery |
nc -v 192.168.1.5 80
nmap -p- 192.168.1.0/24
Date | Version | Description | Author |
---|---|---|---|
2025-05-02 | 1.8 | Full original + enriched operator notes and recommendations | Leo |