Chapter 3. Host Discovery (“Ping Scanning”)
Introduction
One of the very first steps in any network reconnaissance mission is to reduce a (sometimes huge) set of IP ranges into a list of active or interesting hosts. Scanning every port of every single IP address is slow and usually unnecessary. Of course what makes a host interesting depends greatly on the scan purposes. Network administrators may only be interested in hosts running a certain service, while security auditors may care about every single device with an IP address. An administrator may be comfortable using just an ICMP ping to locate hosts on his internal network, while an external penetration tester may use a diverse set of dozens of probes in an attempt to evade firewall restrictions.
Because host discovery needs are so diverse, Nmap offers a
wide variety of options for customizing the techniques used. Despite
the name ping scan, this goes well beyond the simple ICMP echo request
packets associated with the ubiquitous ping
tool. Users can skip the ping step entirely with a list scan
(-sL
) or by disabling ping (-Pn
), or
engage the network with arbitrary combinations of multi-port TCP
SYN/ACK, UDP, and ICMP probes. The goal of these probes is to solicit
responses which demonstrate that an IP address is actually active (is
being used by a host or network device). On many networks, only a
small percentage of IP addresses are active at any given time. This
is particularly common with private address space such
as 10.0.0.0/8. That network has 16.8 million IPs, but I have seen it
used by companies with fewer than a thousand machines. Host
discovery can find those machines in a sparsely allocated sea of
IP addresses.
This chapter first discusses how Nmap ping scanning works overall, with high-level control options. Then specific techniques are covered, including how they work and when each is most appropriate. Nmap offers many ping techniques because it often takes carefully crafted combinations to get through a series of firewalls and router filters leading to a target network. Effective overall ping scanning strategies are discussed, followed by a low-level look at the algorithms used.