ZenMap

From DN Wiki
Jump to navigation Jump to search

Nmap

--disable-arp-ping

By default nmap considers any device that responds to ARP to be "up". If you happen to be WFH, say due to a global pandemic, and on VPN, the VPN client might respond to every ARP request making it look like EVERY IP is up.

You can disable that with --disable-arp-ping, which if you Zenmap, you can add to all the profiles by editing the text file mentioned above.

Scanning

Nmap's default host discovery behavior involves two ICMP requests and tcp to port 80 and 443. You can use -sn to make it just do an ICMP ping instead.

Grepable Output

nmap -oG -

The option is actually -oG FILENAME but the second - makes it output to stdout.

My Most Used Options

nmap -oG - -PE -sn TARGET
  • -oG - = grepable format to stdout
  • -PE = ICMP ping
  • -sn = No port scan

ZenMap

Profiles

On Windows, Profiles are in C:\Users\USERNAME\.zenmap\scan_profile.usp You need this if you want to do something like adding --disable-arp-ping to EVERY profile.