![]() Nmap done: 1 IP address (1 host up) scanned in 42.61 secondsĮither way you can always parse the output through external tools, such as grep. The output will look more or less identical: nmap -R 192.168.1.113 Normally reverse DNS is only performed against ![]() Tells Nmap to always do reverse DNS resolution on the target You can force Nmap to attempt reverse DNS resolution for all targets, by using the following option: -R (DNS resolution for all targets). Nmap done: 1 IP address (1 host up) scanned in 41.88 seconds It should work just like this: nmap 192.168.1.113 Some hosts could simply be configured to not share that information.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |