I'm not sure how to set the NIC to promiscuous despite a google search.
The Wikipedia entry for 'promiscuous mode' is a good starting point. [1]
In Linux, GUI tools like
ethereal (aka
wireshark) [2] and the CLI tool
tcpdump are used to place a NIC in promiscuous mode. It can then be used to capture all or a selection of the frames/packets in the traffic on that ethernet network. This can help to determine whether a device is still alive.
Those tools are for Linux really, but are available for Microsoft although they may not work so well.
Also what scan do I need to run in nmap and what target?
Nmap has comprehensive help on its website. [3]
As suggested earlier, "Also
try port scanning the common ports on the IP blocks for the three private networks using nmap or similar. "
So if you expect to find a webserver running on the device, then you would scan port 80/tcp (HTTP) on all the IP addresses in
Class A,
Class B and
Class C private networks. [4]
That scanning could literally take hours. So it makes sense to begin by port-scanning just a small subset of those IP address ranges. Perhaps try scanning all addresses in the IP blocks:
192.168.0.0/16
10.0.0.0/16
And maybe expand the scan to include ftp (port 25/tcp), tftp perhaps (69/udp), bootp/dhcp, etc etc.. In the scan, include the number (and protocol) of any port on which you expect to find a daemon listening on the Netgear.
Good luck
cheers, a
[1]
http://en.wikipedia.org/wiki/Promiscuous_mode[2]
http://www.wireshark.org [3]
http://nmap.org/docs.html[4]
http://en.wikipedia.org/wiki/Private_network