<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Archiwa nmap - soban</title>
	<atom:link href="https://soban.pl/category/nmap/feed/" rel="self" type="application/rss+xml" />
	<link>https://soban.pl/category/nmap/</link>
	<description>IT, Linux, Servers, Security</description>
	<lastBuildDate>Thu, 26 Feb 2026 14:13:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>
	<item>
		<title>Netdiscover great tool for scaning and watching local network</title>
		<link>https://soban.pl/netdiscover-great-tool-for-scaning-and-watching-local-network/</link>
		
		<dc:creator><![CDATA[soban]]></dc:creator>
		<pubDate>Wed, 20 Oct 2021 14:50:23 +0000</pubDate>
				<category><![CDATA[Bash]]></category>
		<category><![CDATA[Debian]]></category>
		<category><![CDATA[Kali]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[netdiscover]]></category>
		<category><![CDATA[nmap]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://soban.pl/?p=172</guid>

					<description><![CDATA[<p>Netdiscover is a popular network discovery tool that is used in Linux to identify live hosts on a network. It sends ARP (Address Resolution Protocol) requests to the network and then listens for replies from active hosts. By analyzing the replies, Netdiscover can build a list of all hosts that are currently active on the [&#8230;]</p>
<p>Artykuł <a href="https://soban.pl/netdiscover-great-tool-for-scaning-and-watching-local-network/">Netdiscover great tool for scaning and watching local network</a> pochodzi z serwisu <a href="https://soban.pl">soban</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Netdiscover is a popular network discovery tool that is used in Linux to identify live hosts on a network. It sends ARP (Address Resolution Protocol) requests to the network and then listens for replies from active hosts. By analyzing the replies, Netdiscover can build a list of all hosts that are currently active on the network.</p>



<p>Netdiscover is typically used by network administrators to identify all devices on a network and to detect any unauthorized devices that may be connected. It can also be used to identify the IP address of a device on a network that is not responding to conventional network scanning techniques.</p>



<p>Netdiscover is a command-line tool and has a range of options that allow it to be customized for specific network environments. For example, it can be set to scan a particular subnet or to use a specific network interface. Additionally, Netdiscover can output its results in a range of formats, including CSV and XML, making it easy to integrate with other tools and applications.</p>



<p>Overall, Netdiscover is a useful tool for network administrators who need to identify all devices on a network and detect any unauthorized devices that may be connected. Its ability to output results in a range of formats and its customizable options make it a versatile and valuable addition to any network security toolkit.</p>



<p>Netdiscover is a great tool to scan your local network for locally attached devices. It is installed by default in Kali Linux. However, if you want to use it on a raspberry pi, you need to install it. You can do this as follows:</p>



<div class="wp-block-urvanov-syntax-highlighter-code-block"><pre class="urvanov-syntax-highlighter-plain-tag"># apt install netdiscover</pre></div>



<p> In virtualbox I have this setup of network in Kali Linux: </p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="755" src="https://soban.pl/wp-content/uploads/2021/10/image-45-1024x755.png" alt="" class="wp-image-174" srcset="https://soban.pl/wp-content/uploads/2021/10/image-45-1024x755.png 1024w, https://soban.pl/wp-content/uploads/2021/10/image-45-300x221.png 300w, https://soban.pl/wp-content/uploads/2021/10/image-45-768x566.png 768w, https://soban.pl/wp-content/uploads/2021/10/image-45.png 1217w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>The very use of the tool requires specifying the subnetwork in which we are located. We can check it like this:</p>



<div class="wp-block-urvanov-syntax-highlighter-code-block"><pre class="urvanov-syntax-highlighter-plain-tag"># ifconfig</pre></div>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="543" src="https://soban.pl/wp-content/uploads/2021/10/image-48-1024x543.png" alt="" class="wp-image-178" srcset="https://soban.pl/wp-content/uploads/2021/10/image-48-1024x543.png 1024w, https://soban.pl/wp-content/uploads/2021/10/image-48-300x159.png 300w, https://soban.pl/wp-content/uploads/2021/10/image-48-768x408.png 768w, https://soban.pl/wp-content/uploads/2021/10/image-48.png 1029w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>In this case, we can scan network 192.168.1.0/24, so in <strong>netdiscover</strong> we can use:</p>



<div class="wp-block-urvanov-syntax-highlighter-code-block"><pre class="urvanov-syntax-highlighter-plain-tag"># netdiscover -r 192.168.1.0/24</pre></div>



<p>The screen will show the network scanner:</p>



<figure class="wp-block-image size-full"><img decoding="async" width="900" height="223" src="https://soban.pl/wp-content/uploads/2021/10/image-46.png" alt="" class="wp-image-175" srcset="https://soban.pl/wp-content/uploads/2021/10/image-46.png 900w, https://soban.pl/wp-content/uploads/2021/10/image-46-300x74.png 300w, https://soban.pl/wp-content/uploads/2021/10/image-46-768x190.png 768w" sizes="(max-width: 900px) 100vw, 900px" /></figure>



<p>Netdiscover also gives you the option to direct the result to a file, in this case it refreshes the scan every 2 seconds:</p>



<div class="wp-block-urvanov-syntax-highlighter-code-block"><pre class="urvanov-syntax-highlighter-plain-tag"># netdiscover -r 192.168.1.0/24 -s 2 -P &gt;&gt; /tmp/file</pre></div>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="898" height="307" src="https://soban.pl/wp-content/uploads/2021/10/image-49.png" alt="" class="wp-image-183" srcset="https://soban.pl/wp-content/uploads/2021/10/image-49.png 898w, https://soban.pl/wp-content/uploads/2021/10/image-49-300x103.png 300w, https://soban.pl/wp-content/uploads/2021/10/image-49-768x263.png 768w" sizes="auto, (max-width: 898px) 100vw, 898px" /></figure>



<p>Now we can also use nslookup to get hostname:</p>



<div class="wp-block-urvanov-syntax-highlighter-code-block"><pre class="urvanov-syntax-highlighter-plain-tag">$ cat /tmp/file | grep '192\.' | grep -v Screen | cut -c1-14 | sort -u | nslookup | grep name | cut -f 2 | cut -c8-</pre></div>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1019" height="114" src="https://soban.pl/wp-content/uploads/2021/10/image-53.png" alt="" class="wp-image-190" srcset="https://soban.pl/wp-content/uploads/2021/10/image-53.png 1019w, https://soban.pl/wp-content/uploads/2021/10/image-53-300x34.png 300w, https://soban.pl/wp-content/uploads/2021/10/image-53-768x86.png 768w" sizes="auto, (max-width: 1019px) 100vw, 1019px" /></figure>



<p>Also we can use nmap:</p>



<div class="wp-block-urvanov-syntax-highlighter-code-block"><pre class="urvanov-syntax-highlighter-plain-tag"># nmap `cat /tmp/file | grep '192\.' | grep -v Screen | cut -c2-34 | sort -u | awk '{ print $1 }' | tr '\n' ' '`</pre></div>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1021" height="502" src="https://soban.pl/wp-content/uploads/2021/10/image-55.png" alt="" class="wp-image-194" srcset="https://soban.pl/wp-content/uploads/2021/10/image-55.png 1021w, https://soban.pl/wp-content/uploads/2021/10/image-55-300x148.png 300w, https://soban.pl/wp-content/uploads/2021/10/image-55-768x378.png 768w" sizes="auto, (max-width: 1021px) 100vw, 1021px" /></figure>



<p>You can use more parameters in nmap for more information, however this will significantly increase the scan time. Still, sometimes it&#8217;s worth the wait.</p>
<p>Artykuł <a href="https://soban.pl/netdiscover-great-tool-for-scaning-and-watching-local-network/">Netdiscover great tool for scaning and watching local network</a> pochodzi z serwisu <a href="https://soban.pl">soban</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Checking SSL certyfikat date using nmap and curl</title>
		<link>https://soban.pl/checking-ssl-certyfikat-date-using-nmap-and-curl/</link>
		
		<dc:creator><![CDATA[soban]]></dc:creator>
		<pubDate>Thu, 14 Oct 2021 18:04:14 +0000</pubDate>
				<category><![CDATA[Bash]]></category>
		<category><![CDATA[curl]]></category>
		<category><![CDATA[Kali]]></category>
		<category><![CDATA[nmap]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SSL]]></category>
		<guid isPermaLink="false">https://soban.pl/?p=123</guid>

					<description><![CDATA[<p>This time I will use Kali Linux it is a great distro for pentesters. After all, nothing prevents you from using another distribution, such as Debian Linux. Sometimes we need to check the certificate issuance date. Nmap and curl are a very good tool for this.Both of these tools allow for advanced analysis of the [&#8230;]</p>
<p>Artykuł <a href="https://soban.pl/checking-ssl-certyfikat-date-using-nmap-and-curl/">Checking SSL certyfikat date using nmap and curl</a> pochodzi z serwisu <a href="https://soban.pl">soban</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>This time I will use Kali Linux it is a great distro for pentesters. After all, nothing prevents you from using another distribution, such as Debian Linux.</p>



<p>Sometimes we need to check the certificate issuance date. Nmap and curl are a very good tool for this.<br>Both of these tools allow for advanced analysis of the SSL connection. Let&#8217;s try to check the certificate date with nmap:</p>



<div class="wp-block-urvanov-syntax-highlighter-code-block"><pre class="urvanov-syntax-highlighter-plain-tag">$ nmap -p 443 --script ssl-cert soban.pl</pre></div>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="589" height="349" src="https://soban.pl/wp-content/uploads/2021/10/image-26.png" alt="" class="wp-image-124" srcset="https://soban.pl/wp-content/uploads/2021/10/image-26.png 589w, https://soban.pl/wp-content/uploads/2021/10/image-26-300x178.png 300w" sizes="auto, (max-width: 589px) 100vw, 589px" /></figure>



<p>To be more precise, let&#8217;s leave the date and time alone: </p>



<div class="wp-block-urvanov-syntax-highlighter-code-block"><pre class="urvanov-syntax-highlighter-plain-tag">$ nmap -p 443 --script ssl-cert soban.pl | grep after | awk '{ print $5 }'</pre></div>



<p>Here is the result:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="630" height="72" src="https://soban.pl/wp-content/uploads/2021/10/image-27.png" alt="" class="wp-image-125" srcset="https://soban.pl/wp-content/uploads/2021/10/image-27.png 630w, https://soban.pl/wp-content/uploads/2021/10/image-27-300x34.png 300w" sizes="auto, (max-width: 630px) 100vw, 630px" /></figure>



<p id="block-a72e2124-b959-447e-b473-50912ea3f2a4">In my experience nmap is a very good tool &#8211; however curl is much faster, to use it, do the following:</p>



<pre class="wp-block-preformatted">$ curl -X GET -i 'https://google.com' | grep -i 'date:' | grep GMT</pre>



<p>This is the effect:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="670" height="124" src="https://soban.pl/wp-content/uploads/2021/10/image-29.png" alt="" class="wp-image-127" srcset="https://soban.pl/wp-content/uploads/2021/10/image-29.png 670w, https://soban.pl/wp-content/uploads/2021/10/image-29-300x56.png 300w" sizes="auto, (max-width: 670px) 100vw, 670px" /></figure>



<p>It is worth getting acquainted with both tools. Besides checking the date of the certificate, they offer a number of other possibilities.</p>
<p>Artykuł <a href="https://soban.pl/checking-ssl-certyfikat-date-using-nmap-and-curl/">Checking SSL certyfikat date using nmap and curl</a> pochodzi z serwisu <a href="https://soban.pl">soban</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>nmap scaning ciphers and ssl</title>
		<link>https://soban.pl/nmap-scaning-ciphers-and-ssl/</link>
		
		<dc:creator><![CDATA[soban]]></dc:creator>
		<pubDate>Thu, 30 Sep 2021 21:11:59 +0000</pubDate>
				<category><![CDATA[Bash]]></category>
		<category><![CDATA[Debian]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[nmap]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SSL]]></category>
		<guid isPermaLink="false">https://soban.pl/?p=35</guid>

					<description><![CDATA[<p>Nmap – scanning SSL/TLS ciphers on Debian 11 In this example we are working on Debian 11 (Bullseye). First, let&#8217;s confirm the system version: Nmap is one of the most powerful network scanning tools available on Linux. It allows you to scan open ports, detect running services, identify software versions and analyze supported SSL/TLS protocols [&#8230;]</p>
<p>Artykuł <a href="https://soban.pl/nmap-scaning-ciphers-and-ssl/">nmap scaning ciphers and ssl</a> pochodzi z serwisu <a href="https://soban.pl">soban</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Nmap – scanning SSL/TLS ciphers on Debian 11</strong></p>



<p>In this example we are working on <strong>Debian 11 (Bullseye)</strong>. First, let&#8217;s confirm the system version:</p>



<div class="wp-block-urvanov-syntax-highlighter-code-block"><pre class="urvanov-syntax-highlighter-plain-tag"># cat /etc/issue
Debian GNU/Linux 11 \n \l</pre></div>



<p><strong>Nmap</strong> is one of the most powerful network scanning tools available on Linux. It allows you to scan open ports, detect running services, identify software versions and analyze supported <strong>SSL/TLS protocols and cipher suites</strong>.</p>



<p>Installation on Debian 11 is simple:</p>



<div class="wp-block-urvanov-syntax-highlighter-code-block"><pre class="urvanov-syntax-highlighter-plain-tag"># apt install nmap</pre></div>



<p>After installation, we can test a remote HTTPS server. For example:</p>



<div class="wp-block-urvanov-syntax-highlighter-code-block"><pre class="urvanov-syntax-highlighter-plain-tag"># nmap -sV --script ssl-enum-ciphers -p 443 google.com</pre></div>



<p>The <code>-sV</code> option enables service version detection and <code>--script ssl-enum-ciphers</code> checks supported TLS versions and encryption ciphers. This allows you to verify which TLS versions are enabled (TLS 1.0, 1.1, 1.2, 1.3), whether weak ciphers like 3DES are supported and if potential cryptographic vulnerabilities exist.</p>



<p>Nmap is slower than tools like <strong>sslscan</strong>, but the level of detail is very good and useful especially for internal infrastructure testing.</p>



<p><strong>TLS 1.0:</strong></p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="384" src="https://soban.pl/wp-content/uploads/2021/09/image-1-1024x384.png" alt="TLS 1.0 scan result using Nmap" class="wp-image-37" srcset="https://soban.pl/wp-content/uploads/2021/09/image-1-1024x384.png 1024w, https://soban.pl/wp-content/uploads/2021/09/image-1-300x112.png 300w, https://soban.pl/wp-content/uploads/2021/09/image-1-768x288.png 768w, https://soban.pl/wp-content/uploads/2021/09/image-1.png 1086w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p><strong>TLS 1.1:</strong></p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="399" src="https://soban.pl/wp-content/uploads/2021/09/image-2-1024x399.png" alt="TLS 1.1 scan result using Nmap" class="wp-image-39" srcset="https://soban.pl/wp-content/uploads/2021/09/image-2-1024x399.png 1024w, https://soban.pl/wp-content/uploads/2021/09/image-2-300x117.png 300w, https://soban.pl/wp-content/uploads/2021/09/image-2-768x299.png 768w, https://soban.pl/wp-content/uploads/2021/09/image-2.png 1091w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p><strong>TLS 1.2:</strong></p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="583" src="https://soban.pl/wp-content/uploads/2021/09/image-3-1024x583.png" alt="TLS 1.2 cipher suites detected by Nmap" class="wp-image-40" srcset="https://soban.pl/wp-content/uploads/2021/09/image-3-1024x583.png 1024w, https://soban.pl/wp-content/uploads/2021/09/image-3-300x171.png 300w, https://soban.pl/wp-content/uploads/2021/09/image-3-768x437.png 768w, https://soban.pl/wp-content/uploads/2021/09/image-3.png 1084w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>The most important thing when analyzing SSL/TLS configuration is checking for weak or vulnerable ciphers. For example, if you see: <em>&#8220;64-bit block cipher 3DES vulnerable to SWEET32 attack&#8221;</em>, it means the server still supports 3DES, which is vulnerable to the <strong>SWEET32 attack</strong>. In production environments such ciphers should be disabled.</p>



<p>If you are testing a public website, you can also use <strong>https://www.ssllabs.com/ssltest/</strong>. However, for internal servers, staging environments or private infrastructure, using <strong>Nmap directly from your Debian system</strong> is often the best solution. Regular SSL/TLS scanning helps keep your infrastructure secure and ensures that outdated protocols and weak encryption methods are eliminated.</p>
<p>Artykuł <a href="https://soban.pl/nmap-scaning-ciphers-and-ssl/">nmap scaning ciphers and ssl</a> pochodzi z serwisu <a href="https://soban.pl">soban</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
