Host Discovery Lab

Techniques for identifying live hosts across networks using ARP, ping sweeps, and Nmap discovery probes.

Tools/Skills:
Enumeration
Nmap
Posted on November 18, 2025

Nmap Host Discovery Lab Notes

Objective

Discover if demo.ine.local is online, find open ports, and identify running services.

Environment

  • Attacker machine: Kali Linux (GUI access)
  • Target: demo.ine.local (IP: 10.2.23.9)

Steps Performed

1. Host Discovery with ICMP

nmap -sn 10.2.23.9
  • Result: Host seems down\
  • ICMP ping likely blocked by firewall.

2. TCP SYN Ping (Port Scan Ping)

nmap -sn -PS 10.2.23.9
  • Result: Host is up.\
  • SYN ping worked even when ICMP was blocked.

3. TCP SYN Ping with Port Range

nmap -sn -PS1-1000 10.2.23.9
  • Confirms host is up by probing multiple ports.

4. Skipping Host Discovery (-Pn)

nmap -Pn 10.2.23.9
  • Treats host as online regardless of ping reply.\
  • Found open ports: 80, 135, 139, 445, 3389, 49154, 49155.

5. Single Port Scan (443)

nmap -Pn -p 443 10.2.23.9
  • Result: filtered\
  • Port filtering blocks probe responses (could be firewall/router rules).

6. Service Version Detection

nmap -Pn -sV -p 80 demo.ine.local
  • Detected service: HttpFileServer httpd 2.3 running on port 80.
  • OS fingerprint: Windows.

Key Takeaways

  • ICMP ping is not reliable for host discovery (can be blocked).
  • Use -PS or -Pn to bypass ICMP restrictions.
  • Filtered ports mean probes are dropped or blocked, not necessarily closed.
  • -sV helps identify service versions for further exploitation or enumeration.

Useful Nmap Options

Option Purpose


-sn Host discovery only (no port scan) -PS TCP SYN ping on given port(s) -Pn Skip host discovery, assume host is up -p Specify port(s) to scan -sV Service version detection

Conclusion

This lab demonstrated how to confirm host availability and enumerate open ports/services even when ICMP is blocked by firewalls.

flowchart TD A[Kali Machine] --> B[ICMP Ping<br/>ping -c 5 demo.ine.local] B -->|Blocked| C[Nmap -sn<br/>Host seems down] C --> D[Nmap -sn -PS<br/>Host is up] D --> E[Nmap -Pn<br/>Open ports discovered] E --> F[Nmap -Pn -sV -p 80<br/>HttpFileServer 2.3 detected]

Discovered Ports and Services

PortStateServiceVersion/Info
80openhttpHttpFileServer httpd 2.3
135openmsrpcMicrosoft RPC
139opennetbios-ssnNetBIOS Session Service
445openmicrosoft-dsSMB / Windows File Sharing
3389openms-wbt-serverRDP (Remote Desktop)
49154openunknown
49155openunknown
443filteredhttpsPossibly firewalled