IncidentResponsev2

All Port Scan

Task All Port Scan

2.04 – Active_Host_and_Service_Enumeration
2.01 – Create a list of active IP addresses
2.05 – Create a list of active IP addresses with key ports included
2.07 – Scan ICS Equipment Ports
2.06 – Scan all ports of all hosts on given network segment

Conditions

Given a suspected compromised network segment(s), access to a system that can access and scan the identified network segment(s), and network scanning software included in the team’s incident response kit.

Operator Note: Full port scanning is inherently intrusive and noisy. Ensure coordination with network owner and obtain explicit authorization, especially in production environments.

Standards

Operator Note: Scans of all ports will take longer and may trigger IDS/IPS alerts. Plan scan windows accordingly.

End State

All active hosts, ports and services are carefully enumerated based on the specific sub-task accomplished and any anomalies or mis-configurations are identified.

Operator Note: Anomalous services on high ports should be reviewed carefully. Common services usually operate on well-known ports.

Manual Steps

A list of IP ranges can be provided by using the -f IPRanges option; otherwise, a range can be specified with -i IPRange. For each BD, the script will need to be ran.
The script will need to be marked executable before running:

chmod +x NmapScript.sh
1. 2.04 – Active_Host_and_Service_Enumeration
2. 2.01 – Create a list of active IP addresses
3. 2.05 – Create a list of active IP addresses with key ports included
4. 2.07 – Scan ICS Equipment Ports
5. 2.06 – Scan all ports of all hosts on given network segment
6. Exit

Selection:> 1
Selection:> 1
[+] Starting Nmap 7.80 ( https://nmap.org ) at 2020-06-26 13:47 EDT
[+] Nmap scan report for 192.168.69.2
[+] Host is up (0.00084s latency).
[+] Not shown: 999 closed ports
[+] PORT   STATE SERVICE VERSION
[+] 53/tcp open  domain  dnsmasq 2.55
[+] MAC Address: 00:50:56:EB:3D:1D (VMware)
[+] Service detection performed.
[+] Nmap done: 256 IP addresses (6 hosts up) scanned in 17.23 seconds
Selection:> 5
[+] Starting Nmap 7.80 ( https://nmap.org ) at 2020-06-26 14:01 EDT
[+] Nmap done: 256 IP addresses (6 hosts up) scanned in 3.41 seconds

Operator Note: Scan will attempt TCP ports 1-65535 for each live host. Results should be carefully analyzed for unexpected open ports.

Dependencies

sudo apt install nmap

Operator Note: On Windows, install via official installer or choco install nmap.

Other available tools

Operator Note: GUI scanners typically do not support full-port scanning. Use CLI tools (Nmap) for comprehensive coverage.

References

NMAP Site
LAN Spy
NMAP Man Pages
Nmap Network Scanning Book


Operator Recommendations and Additional Tools

Operator Checklist

Tools by Platform

Platform Tool Purpose
Universal Nmap, NmapScript.sh Primary full port scanner
Windows/Linux/macOS Netcat Manual port testing
Linux/macOS masscan High-speed full port scanner (caution required)
Mobile Fing Lightweight alternative (not suitable for full port scans)

Alternate Commands

Full TCP port scan using Nmap:

nmap -p- 192.168.1.0/24

Netcat manual connection (single port check):

nc -vz 192.168.1.5 8080

Best Practices


Revision History

Date Version Description Author
2025-05-02 1.8 Full original + enriched operator notes and recommendations Leo