• nmap: List only open ports while scanning

    2 min read

    nmap open port scan list

    While scanning using nmap a network for a specific port (using the -p option), it can be confusing toe get a list of hosts that are alive with either closed or filtered ports while we only care for open ports:

    $ sudo nmap -sS 10.12.16.0/24 -p 8123
    Starting Nmap 7.80 ( https://nmap.org ) at 2022-12-04 18:18 CET
    Nmap scan report for _gateway (10.12.16.1)
    Host is up (0.0010s latency).
    
    PORT     STATE  SERVICE
    8123/tcp filtered polipo
    MAC Address: CD:44:F0:F4:22:44 (Unknown)
    
    Nmap scan report for 10.12.16.10
    Host is up (0.00020s latency).
    
    PORT     STATE SERVICE
    8123/tcp open  polipo
    MAC Address: DC:A6:33:77:AA:BB (Raspberry Pi Trading)
    
    Nmap scan report for 10.12.16.33
    Host is up (0.00046s latency).
    
    PORT     STATE  SERVICE
    8123/tcp closed polipo
    MAC Address: B8:27:EB:8D:99:11 (Raspberry Pi Foundation)
    
    (...)
    
    Nmap done: 256 IP addresses (15 hosts up) scanned in 1.78 seconds
    

    05/12/2022

    Read more...
  • Using nmap to brute-force SSH

    2 min read

    If we have a bunch of Raspberries on our network and we want to make sure we are not using the default password on any of them, we can using nmap fo trying to brute-force into them

    15/09/2021

    Read more...

From pet to cattle
Treat your kubernetes clusters like cattle, not pets