i want o no how to send the spoofed mac address from nmap

is it possibe?

If not give me some other solution to send the spoofed mac address..
is there any other tool?

On Jun 1, 8:59 pm, Ravi Gopal <[email protected]> wrote:
> #1:*For beginners to start with here is the basics of nmap*:
>
>             ===========================
> Syntax:  nmap <Type of Scan> <options> Target
>             ===========================
>
> *<Scan types>*
> *Types of Scan** **Option*
> SYN scan -sS
> UDP scan -sU
> TCP Scan -sT
> ACK scan -sA
> FIN scan -sF
> Null scan -sN
> XMas Scan -sX
>
> *Note:* FIN,NULL and XMas scans are called as stealth scans.
> There are other types of scans also like icmp Echo, ping scan, Idle scan
> etc. Please refer to NMAP documentation/help for more types.
>
> *<Options>*
> -p<port range> --> port range can be single port or multiple ports separated
> by commas or range of ports (EX: -p23 OR
>                                         -p23,25,110,3389 OR -p1-65535)
> -sV Version         --> displays the version of the service running (Ex: IIS
> 6.0)'
> -O  Operating System --> OS fingerprinting
> -T(0-5) Timing option --> ideally -T4 is preferable for faster scan with
> optimum performance
> -PN host discovery skip --> This option is very useful when you are sure
> that target is up/alive
>
> *Target:*
> Target can be either IP address or netmask or Website
>
> Here are few Exaples:
>
> *nmap -sS -O -p1-65535 192.168.0.34*
> *nmap -sS -sV -p23,80-110,3389 192.168.0.34*
> *nmap -sS -sV -p23 192.168.0-5.1-254*
>
> *<< My Observations:*
> *Nmap scan on Linux operating system is faster than the scan on windows
> operating systems >>*
>
> Regards,
> Ravi Gopal
>
>
>
> On Tue, Jun 1, 2010 at 2:37 AM, Sandeep Thakur <[email protected]> wrote:
> > Thanks Naik for passing us the nmap cheatsheet. Pls find the below
> > link which is interesting and can give you little depths of how nmap
> > works or process the commands...
>
> >http://haymanezzeldin.blogspot.com/2008/03/nmap-detection-and-counter...
>
> > Regards
> > Sandeep Thakur
>
> > On May 31, 10:56 am, Srinivas Naik <[email protected]> wrote:
> > > Hey,
>
> > > Further Scans is disclosed in this attached CheatSheet.
>
> > > Regards,
> > > Srinivas Naik
>
> > > On Sun, May 30, 2010 at 10:42 PM, N41K <[email protected]> wrote:
> > > > Hi,
>
> > > >  Shall we have discussion on NMAP, as there are many Network Security
> > > > Experts in our community.
>
> > > > Lets list out what all can be discussed .
>
> > > > Policy compliance scan
> > > > # nmap -vv –PA80 –PE –PS23 –sS –iL input.lst --excludefile banned.lst
> > > > -A --osscan_limit –F –R -oA policy_check
>
> > > > Firewall Audit
> > > > # nmap -vv –P0 –sA –iL input.lst --excludefile banned.lst –r -n -oA
> > > > firewall
>
> > > > Regards,
> > > > 0xN41K
>
> > >  Nmap5_cheatsheet.pdf
> > > 497KViewDownload
>
> > --
> > You received this message because you are subscribed to the Google Groups
> > "nforceit" group.
> > To post to this group, send an email to [email protected].
> > To unsubscribe from this group, send email to
> > [email protected]<nforceit%[email protected]­om>
> > .
> > For more options, visit this group at
> >http://groups.google.com/group/nforceit?hl=en-GB.- Hide quoted text -
>
> - Show quoted text -

-- 
You received this message because you are subscribed to the Google Groups 
"nforceit" group.
To post to this group, send an email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/nforceit?hl=en-GB.

Reply via email to