- Securing Network Infrastructure
- Sairam Jetty Sagar Rahalkar
- 105字
- 2021-08-20 10:15:22
How do it…
Here are the steps:
- Open nmap in Command Prompt.
- Enter the following syntax in Command Prompt to scan the IP address 192.168.75.136:
nmap 192.168.75.136

- Enter the following syntax in Command Prompt to scan the IP addresses present in the ip.txt file:
nmap -iL ip.txt

- Enter the following syntax in the Command Prompt to exclude the 192.168.75.136 IP address from the scan list:
nmap -v 192.168.75.135/28 --exclude 192.168.75.136

- Enter the following syntax in the Command Prompt to exclude the IP addresses mentioned in the ip.txt file from the scan list:
nmap –v 192.168.75.135/28 --excludefile ip.txt
