2.04 – Active_Host_and_Service_Enumeration
2.01 – Create a list of active IP addresses
2.05 – Create a list of active IP addresses with key ports included
2.07 – Scan ICS Equipment Ports
2.06 – Scan all ports of all hosts on given network segment
Given a suspected compromised network segment(s), access to a system that can access and scan the identified network segment(s), and network scanning software included in the team’s incident response kit.
Operator Note: Always confirm scanning authorization from the network owner and ensure proper communication with affected system owners. Key ports scans can identify sensitive services and create alerts.
Operator Note: Focus on high-value ports such as RDP (3389), SSH (22), HTTP/HTTPS (80/443), SMB (445). These are commonly exploited ports.
All active hosts, ports and services are carefully enumerated based on the specific sub-task accomplished and any anomalies or mis-configurations are identified.
Operator Note: Unknown or unauthorized services running on key ports should immediately be escalated to IR lead.
A list of IP ranges can be provided by using the -f IPRanges option; otherwise, a range can be specified with -i IPRange. For each BD, the script will need to be ran.
The script will need to be marked executable before running:
chmod +x NmapScript.sh
Selection:> 1
[+] Starting Nmap 7.80 ( https://nmap.org ) at ...
[+] Nmap done: ...
Selection:> 2
[+] 192.168.69.1 is live!
[+] ...
Selection:> 3
[+] Starting Nmap 7.80 ( https://nmap.org )
[+] Nmap done: 256 IP addresses (6 hosts up) scanned in 3.41 seconds
Operator Note: This scan focuses on scanning specific ports only, so if no ports are open on target, no output will be shown for those hosts.
Selection:> 4
[!] It is possible for Scada devices to fail with an Nmap scan, do you want to continue? Y
[+] Nmap done...
Selection:> 5
[+] Starting Nmap...
[+] Nmap done
sudo apt install nmap
Operator Note: On Windows, install via Chocolatey or official Nmap installer.
Operator Note: Use GUI scanners only if authorized and validated for enterprise network use.
NMAP Site
LAN Spy
NMAP Man Pages
Nmap Network Scanning Book
| Platform | Tool | Purpose |
|---|---|---|
| Universal | Nmap, NmapScript.sh | Primary scanning tool for key ports |
| Windows/Linux/macOS | Netcat | Manual port connection testing |
| Linux/macOS | masscan | High-speed port discovery |
| Mobile | Fing | Lightweight local port scanning |
nmap -p 22,80,443,445,3389 192.168.1.0/24
nc -vz 192.168.1.100 3389
| Date | Version | Description | Author |
|---|---|---|---|
| 2025-05-02 | 1.8 | Full original + enhanced operator guidance and recommendations | Leo |