HyugaLog

Tunnel Vision vs Landscape Scan โ€“ Learning Nmap the Right Way

Nmap Recon Guide: Tunnel Vision vs Landscape Scan

If you're on a Red Team mission โ€” even a simulated one โ€” you need to see what others can't. Sometimes that means scanning the entire battlefield. Sometimes it means focusing on a single sentry. In this article, we break down the two mindsets that every Nmap user must master: targeted reconnaissance and environmental mapping.

๐ŸŒช๏ธ PART 1 โ€” Tunnel Vision: Targeted Scanning

Imagine you already know the IP of a machine โ€” maybe it's a second PC at home, a test server, or an IoT device. Your job now is to go deep, not wide.

๐Ÿงญ Step 1 โ€“ Find the Target IP

On the machine you want to scan, use the following command to find its IP address:

ip a

Look for a line like:

inet 192.168.1.42/24

This means the machine's IP is 192.168.1.42. Make sure the machine is on the same network as yours so you can reach it.

๐Ÿ”Œ Optional Lab Setup

If you're learning, the easiest way to simulate this is to:

This helps you practice scans in a safe and isolated environment.

๐Ÿ” Step 2 โ€“ Launch a Focused Scan

nmap -sC -sV -O -Pn 192.168.1.42

This reveals open ports, services, software versions, and possible OS fingerprinting. It's the sniper approach โ€” you're focused on a single target.

๐Ÿ“ก Understanding Hosts, Ports & Services

๐Ÿง Host

A host is any device connected to the network โ€” PC, smartphone, printer, or smart lightbulb. Each has an IP address (e.g., 192.168.1.42).

๐Ÿ”Œ Ports

Ports are virtual doors used by services and applications to communicate over the network. Here are a few commonly found ones:

Ports can be:

โš™๏ธ Services

Nmap can detect services running behind open ports. This includes software names and often their versions, e.g., Apache 2.4.41, OpenSSH 7.9, etc. This is critical for vulnerability research.

๐ŸŒ PART 2 โ€” Landscape Scan: Network Reconnaissance

Other times, you're blind in a new environment. You need situational awareness.

๐Ÿงญ Step 1 โ€“ Find Your IP and Subnet

To scan your network, you first need to know your local IP and subnet:

ip a

Look for a line like:

inet 192.168.1.23/24

This tells you your IP is 192.168.1.23 and your subnet is /24, so the network range is 192.168.1.0/24.

๐Ÿ” Step 2 โ€“ Ping the Entire Network

Once you know the subnet, scan to find live hosts:

nmap -sn 192.168.1.0/24

This ping scans the subnet to find live hosts. Sample output:

Nmap scan report for 192.168.1.1 (Router)
Host is up.
Nmap scan report for 192.168.1.42 (Ubuntu-MSI)
Host is up.
Nmap scan report for 192.168.1.74
Host is up.

Once hosts are identified, zoom in:

nmap -sC -sV -O -Pn 192.168.1.42

๐Ÿง  Strategy Breakdown

Tunnel Vision = deep recon on a known IP. Use when your target is precise and valuable.

Landscape Scan = broad awareness. Use to discover hidden assets and understand the terrain.

๐Ÿงจ Bonus: Advanced Nmap Tips

๐Ÿงฐ What to Do With Results

๐Ÿ“‚ Save Your Scan

nmap -sV -O 192.168.1.42 -oN hyuga-scan.txt

๐Ÿ“Œ Final Advice

Start wide, go deep. One gives you the map. The other, the secret doors.

๐Ÿงช Try This โ€“ Your First Recon Challenge

nmap -sC -sV -O -Pn [target-ip]

Try to interpret what services are running. What ports are open? Is there a potential weakness?

๐Ÿ“Œ Nmap Cheat Sheet

โš ๏ธ Ethics Reminder

Only scan networks you are authorized to analyze.

โ€“ Hyuga