# Target Specification Review+ - NM

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Course
Time
7 hours 1 minute
Difficulty
Beginner
CEU/CPE
7
Video Transcription
00:01
Welcome to the beginning of module four of our end map course.
00:05
In this lesson, I'll be going through Target specifications in and Map
00:09
Essentially will be talking about many different ways to tell n map. What hosts and or networks to scan
00:15
in the next lesson will walk through the lab.
00:18
Thanks for walking through this with me.
00:21
In this lesson, we're gonna focus on and maps target specifications.
00:25
First, we'll do a review of targets that I've already shown you. Next, I'll provide you with some additional options, and finally, we'll go through a lab.
00:33
Let's get started.
00:35
So what is a target? And then map? While the target is basically the host or hosts that you are running, the end map scan against
00:43
this could be in the form of an I. P V four address I. P v six address,
00:48
fully qualified domain name or entire networks using ranges, lists or cider notation.
00:55
Where should you put the target? In the end, My command
00:58
Well, this is entirely up to you. But as I said before, I think you should pick a spot and stick to it.
01:03
This will help with learning and will allow you to get fast and efficient with your own map scans.
01:08
I found that putting the target closer to the end is helpful because if you make a mistake in your scan statement or simply want to run the same command again with a different target,
01:19
you can hit Thea Perro and easily get back to the target and change it.
01:23
Okay, let's go through a quick review of the common target specifications.
01:27
These are all the ones we cover briefly. In a previous lesson, I put examples out to the right.
01:33
The first is in Mount Space Single I P address.
01:36
The second is unmapped space and I p address range.
01:41
The third is unmapped space I P. Address slash the number of bits that define the network otherwise known as cider notation.
01:48
The fourth is unmapped space domain name, insider rotation.
01:53
We'll go through these again in the lab.
01:57
Now let's talk about some other targets specifications available to you while using n map.
02:01
Some of these can come in really, really handy.
02:04
The 1st 1 is unmapped space. I p address one space I p address, too, and so forth
02:10
noticed that there is a space between H I p address, but no comma.
02:15
You also should note that the target does not have to be an I P address. It could also be a host name or fully qualified domain name.
02:23
The point is that you can scan separate targets using this command simply by putting a space between the targets.
02:30
The 2nd 1 is unmapped space dash I capital L followed by the name of the file that has a list of the targets you wish to scan.
02:38
This is really helpful when you have a big list of I P addresses, host names or fully qualified domain names that you want to scan without having to type each of men.
02:47
This could come in handy when you're scanning all critical devices inside and outside your company's network perimeter, for example.
02:54
The 3rd 1 is actually really interesting.
02:58
That is unmapped space. Dash I capital are followed by the number of targets
03:04
this scan allows and map to randomly determine I P addresses of hosts to scan outside the perimeter of your network.
03:10
I'm not gonna run this one in the lab because it would go against what we talked about in our ethics and legalities. lesson, but I'm sure it would do little harm if you create a polite in very specific scan from your home.
03:23
In other words, don't do it at work or at school.
03:27
The 4th 1 is in map space. Target or targets space dash, dash, exclude space I. P's or host names to exclude.
03:37
Basically, this tells and map to scan all of the hosts your specified you specified, except for the ones in your exclusion statement.
03:45
Similarly, the 5th 1 is an map. Space targets space
03:50
dash, dash exclude file
03:52
space, the name of the file that contains excluded I P addresses or her host names.
03:58
If you want more information about target specifications, you can use help.
04:01
Take a look at the map man page from the command line, or take a look at the reference Earl on this slide.
Up Next