Ao usar apenas -sL
, nenhum pacote é enviado para o host de destino ( nmap
, portanto, não pode dizer se o host está ativo ou não), ele apenas executa uma pesquisa de nome de host.
Do manual:
-sL
(List Scan)The list scan is a degenerate form of host discovery that simply lists each host of the network(s) specified, without sending any packets to the target hosts. By default, Nmap still does reverse-DNS resolution on the hosts to learn their names. It is often surprising how much useful information simple hostnames give out. For example,
fw.chi
is the name of one company's Chicago firewall.Nmap also reports the total number of IP addresses at the end. The list scan is a good sanity check to ensure that you have proper IP addresses for your targets. If the hosts sport domain names you do not recognize, it is worth investigating further to prevent scanning the wrong company's network.
Since the idea is to simply print a list of target hosts, options for higher level functionality such as port scanning, OS detection, or ping scanning cannot be combined with this. If you wish to disable ping scanning while still performing such higher level functionality, read up on the
-Pn
(skip ping) option.