2.04 – Active_Host_and_Service_Enumeration
2.01 – Create a list of active IP addresses
2.05 – Create a list of active IP addresses with key ports included
2.07 – Scan ICS Equipment Ports
2.06 – Scan all ports of all hosts on given network segment
Given a suspected compromised network segment(s), access to a system that can access and scan the identified network segment(s), and network scanning software included in the team’s incident response kit.
Operator Note: Always confirm scanning authorization from the network owner and ensure proper communication with affected system owners. Key ports scans can identify sensitive services and create alerts.
Operator Note: Focus on high-value ports such as RDP (3389), SSH (22), HTTP/HTTPS (80/443), SMB (445). These are commonly exploited ports.
All active hosts, ports and services are carefully enumerated based on the specific sub-task accomplished and any anomalies or mis-configurations are identified.
Operator Note: Unknown or unauthorized services running on key ports should immediately be escalated to IR lead.
A list of IP ranges can be provided by using the -f IPRanges
option; otherwise, a range can be specified with -i IPRange
. For each BD, the script will need to be ran.
The script will need to be marked executable before running:
chmod +x NmapScript.sh
Selection:> 1
[+] Starting Nmap 7.80 ( https://nmap.org ) at ...
[+] Nmap done: ...
Selection:> 2
[+] 192.168.69.1 is live!
[+] ...
Selection:> 3
[+] Starting Nmap 7.80 ( https://nmap.org )
[+] Nmap done: 256 IP addresses (6 hosts up) scanned in 3.41 seconds
Operator Note: This scan focuses on scanning specific ports only, so if no ports are open on target, no output will be shown for those hosts.
Selection:> 4
[!] It is possible for Scada devices to fail with an Nmap scan, do you want to continue? Y
[+] Nmap done...
Selection:> 5
[+] Starting Nmap...
[+] Nmap done
sudo apt install nmap
Operator Note: On Windows, install via Chocolatey or official Nmap installer.
Operator Note: Use GUI scanners only if authorized and validated for enterprise network use.
NMAP Site
LAN Spy
NMAP Man Pages
Nmap Network Scanning Book
Platform | Tool | Purpose |
---|---|---|
Universal | Nmap, NmapScript.sh | Primary scanning tool for key ports |
Windows/Linux/macOS | Netcat | Manual port connection testing |
Linux/macOS | masscan | High-speed port discovery |
Mobile | Fing | Lightweight local port scanning |
nmap -p 22,80,443,445,3389 192.168.1.0/24
nc -vz 192.168.1.100 3389
Date | Version | Description | Author |
---|---|---|---|
2025-05-02 | 1.8 | Full original + enhanced operator guidance and recommendations | Leo |