A caveat for the intrepid explorer. These types of probes are grounds for termination in many corporate environments and will set off all kinds of Intrusion Detection and security alerts in a well secured and monitored network. It is less than polite when used against any public network and may be considered a violation of your terms of service with your ISP which could result in loss of your account.
The net is not the friendly place it once was. Employers frequently have written zero tolerance policies for abuse of corporate network resources. Just looking, mapping, checking, probing are no longer considered innocent activities in many corners. As the sign says when you enter Maryland.... DRIVE GENTLY. Experiments are best conducted on your own personal private network where you can learn safely. Virtual machines work really well for all manner of networking learning exercises z/VM, VMWARE http://www.vmware.com , XEN, lots of others. In any case make sure you have the owner or employer's permission (best if written or email) from network administration and security administration before you go trying to map networks you don't personally own. Best Regards, Sam Knutson, GEICO Performance and Availability Management mailto:[EMAIL PROTECTED] (office) 301.986.3574 Dilbert's Words of Wisdom: Do not meddle in the affairs of dragons, 'cuz, like, you are crunchy and taste good with ketchup. -----Original Message----- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of John S. Giltner, Jr. Sent: Saturday, July 15, 2006 10:59 PM To: [email protected] Subject: Re: TCPIP - Ping tool Mike Liberatore wrote: > is there a tool similar to PING that can be used to identify all the > IPS in yor your NETWORK? > I use nmap (http://www.insecure.org/nmap/) and superscanner (http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&sub content=/resources/proddesc/superscan4.htm) Using nmap you can enter the command: nmap -sP 192.168.10.0/24 > responded.txt and the file responded.txt will contain all of the IP addresses that responded. However this only works if the devices are up and running, and do NOT have sometype of firewall blocking ICMP packets. ==================== This email/fax message is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this email/fax is prohibited. If you are not the intended recipient, please destroy all paper and electronic copies of the original message. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

