this is obsolete doc -- see http://doc.nethence.com/ instead

Network scans 

 

Port scans 

Scan ports <= 1024, 

  nmap target_address 

 

Scan really ALL ports, 

  nmap -p 0-65535 target_address 

 

Note. if it doesn't respond to ping, add, 

-Pn

(previously -P0 and -PN) 

 

OS guessing 

Try to find out what operating system the remote host is using, 

nmap -O remote_ip

 

ARP scans 

Proceed with an ARP scan against a subnet e.g., 

nmap -sP 192.168.0.0/24

 

Scan for existing ARP traffic, 

tcpdump -n -i eth0 arp

 

Simple ping 

Proceed with a simple ping scan against a subnet. Using the Windows ping utility inside cygwin, 

vi scping.ksh

like, 

#!/bin/ksh
[[ ! `uname` = CYGWIN_NT-5.1 ]] && print system is not CYGWIN_NT-5.1 && exit 1
for n in `seq 1 254`; do
        ping -n 1 -w 200 192.168.0.$n >/dev/null && print 192.168.0.$n
done

note. 200 milliseconds should be enought for the (pingable) remote hosts to respond 

ready to go, 

chmod +x scping.ksh
./scping.ksh