Sunday 11 May 2014

How to use netmask in kali linux ??

// introduction:-

 Netmask is another simple tool which does one thing and that is, makes a ICMP netmask request. By determining the netmasks of various computers on a network, you can better map your subnet structure.

// How to open 

Application →Kali Linux → Information gathering → Route Analysis → netmask 



// OR

Open Terminal type netmask –h this command will open netmask with help options
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDvkYAUf-ndcvBLhO0d0LurgM6CcqZdxgV6YveXl02posCVCvn3i9uAOCqFP-IWXBLN0C29Vk2h7ZS3QjY0zcCIMUnzzL91zOkbTwdFBcbWjusza9CPsZwdYfGTHsqoDEFMohyVgApk2Cy/s1600/1b_new.jpg

2. netmask  –v :- This command is used to visit netmask version which is installed in your system.
Syntax:- netmask –v
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCOb6L1F6hYzq-2HItEdi_dIduJGDgv27Cc_gS2K_Ia96F9Cd_NATzAxnjsOY8-S7pUNWMryGX9g0cTB2di0YojHJ46w3CbA0cFu4Do1rtwdgVtfodVfs35bFcHuL0DOZDIp8-cvfAUVgq/s1600/2_new.jpg 
3. This is default search for a domain or IP.
Syntax:- netmask domain/IP
Ex :-  netmask google.com 
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaa7TsVNtxXWjeqyFB_F5sqRVK1qAxWj3CNysf-XB1A2tTaPkoEFsdG-tqW57ptjiyW31j78o3NIIZS0srgfSVAZYgiH-ieJVoLTebruwDJ3lyVbD79YRspiKP75zlcGFXzKkA8mpXlXGL/s1600/3a_new.jpg
Ex :-  netmask 192.168.71.131
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4UcUcTh3qGmShkTqB4y7N5nhgjXA5O_R50j7Rnq1r4BNCt8KrG9RhNDloBagd7XAdmK6Xz7bgRiH8Jma7b_Zuarj25cwTJ3ytmilaGHtfPeoivnzQt60aWvsKOTh_EWt74S2N7YD2HFgF/s1600/3b_new.jpg

4.  Output address/netmask pairs
Syntax:- netmask –s domain/IP
Ex :- netmask –s google.com
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3iMjEsInqasot6l_wsaI0t0VoC4HHYDxCrkw0wMQFOtN8H6dBQx_euwTPD6O3Yp6auHimAWO4lgnvAFURsynzuLGnrXKgWLaAh6ZQqmO3yZ8EZeWrWZgsDoJ0yAThxo6thTKptXff8rLN/s1600/4a_new.jpg

Ex :- netmask –s 192.168.71.13
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5grPcnl7Gg_BYRoenvPQwFNnr9Vf_KeIkCIVBRV4kleF_zCCUH-WbRYWWnOo01hBIaNqPt-edVY4x-608hWM11TeETrMhEwkLw-WFbZhKgpEH-mx5IA5NOhiXmcYgPQX0iYHv2yzT-D68/s1600/4b_new.jpg 

5. Output CIDR format address lists
Syntax :– netmask –c domain/IP

Ex :–  netmask –c google.com


E :–    netmask –c 192.168.71.131
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZetAse3TdXskwYI1EU0qXVRligxwfYodqd2TYL-G2aS1AHcrD2m02_1rvWu0cS5DLCABJG-kFQSv04oF2m0PwX-2ygQ-3a-QXCLYekyNT99r93gmkVPlVf9TSW0pZSAHowMXHZyG2VkQg/s1600/5_new.jpg 


6. Output Cisco style address lists
Syntax :– netmask –i domain/IP
Ex – netmask –i google.com
Ex – netmask –i 192.168.71.131
 https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvVuW9pkn3FoUo6teaIktAZJjXVfKNxU0lNo5tmVZN_d_40esrcAfaIfmfzQKDM2yUpcIQV2iBDZHOvChJoSE-5t3x3PgMLaCgnX1f0joej0d06Wdb-hTSjGzE8s80gET8yGvns2vzhq7d/s1600/6_new.jpg\

7. Output ip address ranges
Syntax – netmask –r domain/IP
Ex – netmask –r google.com
Ex – netmask –r 192.168.71.131
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOh8PaCxbKpIKrbrqJKAB8koRBnJIupTtwW97HO7fUub798p9hJ_hAkN1VS7qXwP5GSI7pxyJoE6F4JJeUFMwydc_14eJ7RAC-1GTJqzuTKeIgUwVwD-PHPA7KUrXlNL7kZ_mwHGMYbaYe/s1600/7_new.jpg 
8. Output address/netmask pairs in hex.
Syntax – netmask –x domain/IP
Ex – netmask –x google.com
Ex – netmask –x 192.168.71.131
 https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxbSDa63xTviAEzZRhdJUGOK-7iaR4-CbCGk4P6i6tmzdj6KlwYJSgS3ZX25uuKDKsPD-ePfNYG4vu5VhVE_aZKFZzq8DIgv0KJJ2SudVsF1-sRroxOV-LgUw74F3WMG83Z7GEnmGGU7-M/s1600/8_new.jpg


9. Output address/netmask pairs in octal.
Syntax – netmask –o domain/IP
Ex – netmask –o google.com
Ex – netmask –o 192.168.71.131
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcEgm4_2pbQdJ66kpl-_KbpycUHIk1VcN3A3OpKnIvFLZhuFyTRGsJI54M5yok3jff6lNbCUkJKPfC5HjqGur3VzbYiEIIl1u8TcCwwNQLxbuQliVU5zwKPFLxD92lpiwcEH2tVd99FyIo/s1600/9_new.jpg


10. Output address/netmask pairs in binary
Syntax – netmask –b domain/IP
Ex – netmask –b google.com
Ex – netmask –b 192.168.71.131
 
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9lbVqlWgyUxAO99sUeCV5cYPlSnIvhpdmxjZWEDayEHWiRQYu2Xm1pRiPj0lJbZ8H_XrsHyELxWZJVLpeq5CrtqflZjIa2l18Fnf3DonOi3ebgSmqaZbaNu2HPs2dRpRXLwyb-ax9tSYi/s1600/10_new.jpg


that's it
 image by :-geeky show 

1 comment:

  1. Do you need to increase your credit score?
    Do you intend to upgrade your school grade?
    Do you want to hack your cheating spouse Email, whatsapp, Facebook, instagram or any social network?
    Do you need any information concerning any database.
    Do you need to retrieve deleted files?
    Do you need to clear your criminal records or DMV?
    Do you want to remove any site or link from any blog?
    you should contact this hacker, he is reliable and good at the hack jobs..
    contact : cybergoldenhacker at gmail dot com

    ReplyDelete