IT Oct. 22 Assignment



Ethereal:
Here is a little HTTP exchange. I stuck it in a seperate file for convenience:
tcppackets.txt

Nmap (part deux):

So here I wanted to do something a little different, so I wrote a little PERL script that utilizes both Nmap's normal mode and one of its more interesting ones. The script first runs Nmap's ping scanning mode (-sP), which sends ICMP echo packets to see what hosts are up (assuming they respond). This info is saved to a temp file and the IP address is stripped from each line. Nmap is then run on each address, giving a rather large output of the open ports on all hosts on a specified range. Further info in the header comment block.

findscan.pl Note: this script needs to be run as root.