Scanning your LAN for conficker using nmapJun 30, 2009, 21:02 (0 Talkback[s])
(Other stories by Ahmed Kamal)
[ Thanks to Ahmed Kamal for this link. ]
"It is recommended that you get the latest nmap from their download page. Next, launch nmap on the local network IP range, in this example it is 192.168.96.0/22, but YMMV. The interesting argument here is the --script which utilizes the NSE (Nmap scripting engine) in order to assess whether or not the current windows machine nmap is connected to is vulnerable. So let's launch the scan:"
0 Talkback[s] (click to add your comment)