NMAP | Simple Protocol Scan

The first thing you try to discover is what systems may be active. We covered this to some degree in our first tutorial. Just to recap:

This will scan all IP addresses from 192.168.11.1 to 192.168.11.254. It will also identify potential open ports.

Well now we want to get a little more information about one of these machines. We want to identify what protocols are running on the target machine. For this we use:

The -v puts NMAP into verbose mode and will display everything as it occurs. the -sO tells NMAP that we are scanning for open protocols on the target IP address.