--- tags: ccdc --- # Some NMAP/subnetting Documentation ## Install NMAP @TODO Document this ## Install Vulners @TODO Document this ## Make network map using nmap First, you need to find what IP address you are currently on and the subnet mask in order to find what IP addresses you will need to scan. You can do this in two ways, although preferably you would use the first one: ```bash $ ip a 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: eth0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast state DOWN group default qlen 1000 link/ether b0:25:aa:30:d3:8d brd ff:ff:ff:ff:ff:ff 3: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000 link/ether 40:74:e0:8b:3b:48 brd ff:ff:ff:ff:ff:ff inet 172.16.94.117/17 brd 172.16.127.255 scope global dynamic noprefixroute wlan0 valid_lft 684985sec preferred_lft 684985sec inet6 fe80::1655:83a4:789c:4213/64 scope link noprefixroute valid_lft forever preferred_lft forever ``` ```bash $ ifconfig eth0: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500 ether b0:25:aa:30:d3:8d txqueuelen 1000 (Ethernet) RX packets 0 bytes 0 (0.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 0 bytes 0 (0.0 B) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536 inet 127.0.0.1 netmask 255.0.0.0 inet6 ::1 prefixlen 128 scopeid 0x10<host> loop txqueuelen 1000 (Local Loopback) RX packets 20 bytes 864 (864.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 20 bytes 864 (864.0 B) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 wlan0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 172.16.94.117 netmask 255.255.128.0 broadcast 172.16.127.255 inet6 fe80::1655:83a4:789c:4213 prefixlen 64 scopeid 0x20<link> ether 40:74:e0:8b:3b:48 txqueuelen 1000 (Ethernet) RX packets 244502 bytes 255695412 (243.8 MiB) RX errors 0 dropped 1 overruns 0 frame 0 TX packets 84327 bytes 13405118 (12.7 MiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 ``` What you are focusing on here is the inet address. This is the IP address of the machine that you are currently on. With 'ip a' it tells you what the subnet mask of the network is, identified by the /17 at the end of the inet address. With ifconfig you will have to take the netmask to a subnet calculator in order to find the correct net mask that nmap will accept. ## Vulnerability Report using nmap