Solved

Nmap ping flooding and network sniffing?

Posted on 2013-12-08
2
1,003 Views
Last Modified: 2013-12-09
I am looking for quick sources on specific nmap usage; network sniffing, and ping flooding. Do any of you guys have examples or good links that give me what I am looking for?
0
Comment
Question by:itnifl
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 17

Assisted Solution

by:TimotiSt
TimotiSt earned 150 total points
ID: 39706838
Nmap is not exactly for classic 'sniffing', it is a network scanner.
Wireshark can be used for sniffing network traffic.
Ping flooding can be done by the stock or custom ping applications under most operating systems.

(Please note: sniffing and ping flooding outside your own learning lab can get you into serious trouble. But I assume you have decent goals, like learning.)

Tamas
0
 
LVL 63

Accepted Solution

by:
btan earned 200 total points
ID: 39707407
Likewise do have good intent on use of such tool in lab as kickstart. I suggest you take a look at security onion.

https://code.google.com/p/security-onion/wiki/Tools

Nmap itself ( or zenmap) below may help but it is not for sniffing, security onion has tcpdump and networkminer

http://www.cyberciti.biz/networking/nmap-command-examples-tutorials/
https://code.google.com/p/security-onion/wiki/NetworkConfiguration
0

Featured Post

Online Training Solution

Drastically shorten your training time with WalkMe's advanced online training solution that Guides your trainees to action. Forget about retraining and skyrocket knowledge retention rates.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Dell Laptop dropped and Network plug or wireless dont work 7 41
Certification Follow-up 2 63
CentOS 7 wireless 2 34
WSUS Cannot Sync with Microsoft Update 4 29
If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question