The command I used to scan the subnet was:
nmap -PR -oN nmap-arpscan.txt 192.168.0.0/16
This scanned the entire 192.168.0.0/16 network and logged the results to a text file called nmap-arpscan.txt for later review.
One reason to do an ARP sweep on a network is that this will find even firewalled hosts as a system on an IP network may have ICMP filtered but ARP is practically a necessity to participate in network communications. So, this scan will find even firewalled hosts!
You can get more information about NMap from some of my previous blog postings:
Online Nmap video training – scan your network
Nmap v5 released – nearly 600 changes!
What other NMap scans do you do? Share your tips with other ITKE readers!
Thanks for reading and let’s continue to be good network citizens.]]>