2.04 – Active_Host_and_Service_Enumeration
2.01 – Create a list of active IP addresses
2.05 – Create a list of active IP addresses with key ports included
2.07 – Scan ICS Equipment Ports
2.06 – Scan all ports of all hosts on given network segment
Given a suspected compromised network segment(s), access to a system that can access and scan the identified network segment(s), and network scanning software included in the team’s incident response kit.
Operator Note: Full port scanning is inherently intrusive and noisy. Ensure coordination with network owner and obtain explicit authorization, especially in production environments.
Operator Note: Scans of all ports will take longer and may trigger IDS/IPS alerts. Plan scan windows accordingly.
All active hosts, ports and services are carefully enumerated based on the specific sub-task accomplished and any anomalies or mis-configurations are identified.
Operator Note: Anomalous services on high ports should be reviewed carefully. Common services usually operate on well-known ports.
A list of IP ranges can be provided by using the -f IPRanges
option; otherwise, a range can be specified with -i IPRange
. For each BD, the script will need to be ran.
The script will need to be marked executable before running:
chmod +x NmapScript.sh
1. 2.04 – Active_Host_and_Service_Enumeration
2. 2.01 – Create a list of active IP addresses
3. 2.05 – Create a list of active IP addresses with key ports included
4. 2.07 – Scan ICS Equipment Ports
5. 2.06 – Scan all ports of all hosts on given network segment
6. Exit
Selection:> 1
Selection:> 1
[+] Starting Nmap 7.80 ( https://nmap.org ) at 2020-06-26 13:47 EDT
[+] Nmap scan report for 192.168.69.2
[+] Host is up (0.00084s latency).
[+] Not shown: 999 closed ports
[+] PORT STATE SERVICE VERSION
[+] 53/tcp open domain dnsmasq 2.55
[+] MAC Address: 00:50:56:EB:3D:1D (VMware)
[+] Service detection performed.
[+] Nmap done: 256 IP addresses (6 hosts up) scanned in 17.23 seconds
Selection:> 5
[+] Starting Nmap 7.80 ( https://nmap.org ) at 2020-06-26 14:01 EDT
[+] Nmap done: 256 IP addresses (6 hosts up) scanned in 3.41 seconds
Operator Note: Scan will attempt TCP ports 1-65535 for each live host. Results should be carefully analyzed for unexpected open ports.
sudo apt install nmap
Operator Note: On Windows, install via official installer or
choco install nmap
.
Operator Note: GUI scanners typically do not support full-port scanning. Use CLI tools (Nmap) for comprehensive coverage.
NMAP Site
LAN Spy
NMAP Man Pages
Nmap Network Scanning Book
Platform | Tool | Purpose |
---|---|---|
Universal | Nmap, NmapScript.sh | Primary full port scanner |
Windows/Linux/macOS | Netcat | Manual port testing |
Linux/macOS | masscan | High-speed full port scanner (caution required) |
Mobile | Fing | Lightweight alternative (not suitable for full port scans) |
nmap -p- 192.168.1.0/24
nc -vz 192.168.1.5 8080
Date | Version | Description | Author |
---|---|---|---|
2025-05-02 | 1.8 | Full original + enriched operator notes and recommendations | Leo |