In this lab, you will use ifconfig command to find the three networks that are shown in
Figure 1 that you will use to do active and passive scanning with Nmap and arp-scan.
Finding Rogue Devices with arp-scan and Nmap
Two ways to find rogue devices on the network include arp-scan and Nmap. Rogue
devices connect to your network illegally to do harm to your network.
arp-scan is a command-line tool for system discovery and fingerprinting. It constructs and
sends Address Resolution Protocol (ARP) requests to the specified Internet Protocol (IP)
addresses and displays any responses that are received.
You can also use Nmap to do system discovery and fingerprinting. This lab explores the
two methods of locating rogue devices on the network.
Active, Passive, and Hybrid Scanning with Nmap
The three scanning techniques that are widely used by Nmap are active scanning, passive
scanning, and hybrid scanning. Active scanning is the technique where Nmap sends
packets to all the hosts on a network or subnet and waits for responses from them.
Passive scanning is done by examining packets sent from other nodes on a network or
subnet. Hybrid scanning is the technique where Nmap sends one or more initial packets
and then uses passive scanning to search for responses from the target host.
Wireshark—Capturing Packets
Wireshark is a network protocol analyzer. The graphical user interface (GUI) is shown in
Figure 2. It allows you to inspect and capture packets on your network. It allows you to
inspect the traffic that is transmitting on your network. In this lab, you use Wireshark to
capture and investigate packets to discover a rogue system on the network and the type
of system it is.