A caveat for the intrepid explorer.   These types of probes are grounds
for termination in many corporate environments and will set off all
kinds of Intrusion Detection and security alerts in a well secured and
monitored network.  It is less than polite when used against any public
network and may be considered a violation of your terms of service with
your ISP which could result in loss of your account.  

The net is not the friendly place it once was.  Employers frequently
have written zero tolerance policies for abuse of corporate network
resources.
Just looking, mapping, checking, probing are no longer considered
innocent activities in many corners.

As the sign says when you enter Maryland....  DRIVE GENTLY.

Experiments are best conducted on your own personal private network
where you can learn safely.   Virtual machines work really well for all
manner of networking learning exercises z/VM, VMWARE
http://www.vmware.com , XEN, lots of others.

In any case make sure you have the owner or employer's permission (best
if written or email) from network administration and security
administration before you go trying to map networks you don't personally
own.  

        Best Regards, 

                Sam Knutson, GEICO 
                Performance and Availability Management 
                mailto:[EMAIL PROTECTED] 
                (office)  301.986.3574 

Dilbert's Words of Wisdom: Do not meddle in the affairs of dragons,
'cuz, like, you are crunchy and taste good with ketchup.

-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of John S. Giltner, Jr.
Sent: Saturday, July 15, 2006 10:59 PM
To: [email protected]
Subject: Re: TCPIP - Ping tool

Mike Liberatore wrote:
> is there a tool similar to PING that can be used to identify all the 
> IPS in yor your NETWORK?
> 

I use nmap (http://www.insecure.org/nmap/) and superscanner

(http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&sub
content=/resources/proddesc/superscan4.htm)

Using nmap you can enter the command:

     nmap -sP 192.168.10.0/24 > responded.txt

and the file responded.txt will contain all of the IP addresses that
responded.  However this only works if the devices are up and running,
and do NOT have sometype of firewall blocking ICMP packets.
====================
This email/fax message is for the sole use of the intended
recipient(s) and may contain confidential and privileged information.
Any unauthorized review, use, disclosure or distribution of this
email/fax is prohibited. If you are not the intended recipient, please
destroy all paper and electronic copies of the original message.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to