How do I go about figuring out the manual commands being run by things like nmap and aircrack? In other words, I want to figure out exactly what commands are being run in the background that we can't see, the commands that are being automated by these programs information. A google search of "manually portscan without nmap" only leads to links about automating nmap scans.
Please tell me how to scan OS in our network.I able scan the OS but i want output only os[/B] i am getting so many outputs.I don't want those things.
Below is the my output
[root@B16-SN-DV-173-TEST nmap-6.40]# nmap -O -v 10.106.9.99
Warning: File ./nmap-os-db exists, but Nmap is using /usr/local/bin/../share/nmap/nmap-os-db for security and consistency reasons. set NMAPDIR=.