I have a lot of stuff on my home network. Sometimes it's difficult to keep track on it all.
Every now and then I like to run a scan and see what's on my network. What ports are they using? Who made that device?
Now this can also be used as a low-level hacker tool, but I'm not too worried about it, since you have to already be on the network
you are scanning in order for this to work.
Warning:** - Only try this at home. Don't do this at your work unless you are on the network team.
Network admins usually don't like people scanning their networks, and often will disable the port you are on, effectively
keeping you off the network. In fact, some routers and switches are set up to do this automatically.
Obviously, you should change that to whatever subnet you are on.
Depending on how many devices are on your subnet, this can return quite a list.
A lot of hackers use nmap to see what IPs are on a subnet, and then what ports are exposed to the network on that subnet.
This will show the IP addresses, the MAC addresses, which ports are running on that device, and usually the manufacturer of that device.
In some cases, it will be obvious if the manufacturer is Apple or Dell.
In other cases, it's a little harder to tell which device is which, for example the manufacturer might show up as Atheros, Broadcom, or Intel.
Then you have to know what network chipset is in your computer.
This also works for cell phones and printers, my devices show up as Samsung and Brother.
But it's a handy tool to know how many, and what devices are currently on your network.
There are other things nmap will scan also, perhaps if there is enough interest, I will talk about those.
Every now and then I like to run a scan and see what's on my network. What ports are they using? Who made that device?
Now this can also be used as a low-level hacker tool, but I'm not too worried about it, since you have to already be on the network
you are scanning in order for this to work.
Warning:** - Only try this at home. Don't do this at your work unless you are on the network team.
Network admins usually don't like people scanning their networks, and often will disable the port you are on, effectively
keeping you off the network. In fact, some routers and switches are set up to do this automatically.
Code:
nmap -sT 10.0.0.0/24
Obviously, you should change that to whatever subnet you are on.
Code:
nmap -sT 192.168.0.0/24
Depending on how many devices are on your subnet, this can return quite a list.
A lot of hackers use nmap to see what IPs are on a subnet, and then what ports are exposed to the network on that subnet.
This will show the IP addresses, the MAC addresses, which ports are running on that device, and usually the manufacturer of that device.
In some cases, it will be obvious if the manufacturer is Apple or Dell.
In other cases, it's a little harder to tell which device is which, for example the manufacturer might show up as Atheros, Broadcom, or Intel.
Then you have to know what network chipset is in your computer.
This also works for cell phones and printers, my devices show up as Samsung and Brother.
But it's a handy tool to know how many, and what devices are currently on your network.
There are other things nmap will scan also, perhaps if there is enough interest, I will talk about those.
Last edited: