On 07/12/2017 05:10 PM, Doug wrote: > > On 07/12/2017 06:42 PM, Samuel Sieb wrote: >> On 07/12/2017 04:39 PM, Doug wrote: >>> On 07/12/2017 09:55 AM, Frank Pikelner wrote: >>>> It is not complicated finding SSH running on a different port using >>>> Nmap: >>>> >>>> i.e. nmap -p- -sV <hostname/IP> >>>> >>> running PCLOS. Command fails: >>> >>> [doug@linux1 ~]$ su >>> Password: >>> [root@linux1 doug]# nmap -p -sV linux1 1.192.168.1/24 >> >> It's the difference between "-p" and "-p-". >> _____________________________________________ > > > Still doing something wrong: > > (this PC is static named 192.168.1.11 and is called "linux1" > > [root@linux1 doug]# nmap -p- -sV linux1/192.168.1.11 > > Starting Nmap 7.40 ( https://nmap.org ) at 2017-07-12 19:00 EST > Unable to split netmask from target expression: "linux1/192.168.1.11" > WARNING: No targets were specified, so 0 hosts scanned. > Nmap done: 0 IP addresses (0 hosts up) scanned in 0.24 seconds > [root@linux1 doug]# nmap -p- -sV linux1/192.168.1.11 Your command should be: nmap -p- -sV linux1 Or, to scan your entire 192.168.1.0 class C network: nmap -p- -sV 192.168.1.0/24 To scan both: nmap -p- -sV linux1 192.168.1.0/24 ---------------------------------------------------------------------- - Rick Stevens, Systems Engineer, AllDigital ricks@xxxxxxxxxxxxxx - - AIM/Skype: therps2 ICQ: 226437340 Yahoo: origrps2 - - - - Brain: The organ with which we think that we think. - ---------------------------------------------------------------------- _______________________________________________ users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx