0% found this document useful (0 votes)
286 views

Network Security Lab: What Is Nmap?

This document discusses using Nmap to scan networks and systems. It provides examples of using Nmap to ping a website to check if it is up, scan a range of IP addresses using Nmap 192.168.1.1-20, scan an entire subnet using Nmap 192.168.1.0/24, and perform a TCP SYN stealth scan with Nmap -sS. The document also discusses using Nmap -A to enable OS detection, version detection and script scanning, and using Nmap -sn -Pn -traceroute to traceroute a target without port scanning.

Uploaded by

Deepanshu Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
286 views

Network Security Lab: What Is Nmap?

This document discusses using Nmap to scan networks and systems. It provides examples of using Nmap to ping a website to check if it is up, scan a range of IP addresses using Nmap 192.168.1.1-20, scan an entire subnet using Nmap 192.168.1.0/24, and perform a TCP SYN stealth scan with Nmap -sS. The document also discusses using Nmap -A to enable OS detection, version detection and script scanning, and using Nmap -sn -Pn -traceroute to traceroute a target without port scanning.

Uploaded by

Deepanshu Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

NETWORK SECURITY LAB

DEEPANSHU SHARMA

 What is Nmap?
NMAP short for Network Mapper, is a network discovery and security auditing tool. It is
known for its simple and easy to remember flags that provide powerful scanning options.

Task 1

 Ping to the website to check whether it is up or down. We also find the IP address of the
website
 Nmap (ip address) provides the list of open ports

Scanning
to can scan a range of IP address too:

 nmap 192.168.1.1-20

to scan an entire subnet:

 nmap 192.168.1.0/24
TCP SYN (Stealth) Scan (-sS)
This is a form of TCP scan where nmap itself crafts a syn packet, which is the first
packet that is sent to establish a TCP connection. What is important to note here is
that the connection is never formed, rather the responses to these specially crafted
packets are analyzed by Nmap to produce scan results.

  T0 T1 T2 T3 T4 T5
Name Paranoid Sneaky Polite Normal Aggressive Insane
-A: Enables OS detection, version detection, script scanning, and traceroute
Tracerouting as its name says consists in gathering information on the intermediating routers through
which the traffic pass from a point to another.

 nmap -sn -Pn –traceroute nmap.org
the option -sn instructs Nmap to omit the default port scan

the option or flag -Pn instructs Nmap to avoid the host discovery since we know the host is alive

QUESTIONS

1. What is the full command you used to run the port scan (including arguments)?

A sudo nmap -sS -A 45.33.32.156 -T4

2. What is the IP address of scanme.nmap.org?

A 45.33.32.156

3. What ports are open on the target server? What applications are runningon those ports?

A 22/tcp is open and OpenSSH ubuntu is running

80/tcp is open and Apache is tunning

9929 is open

31337 is open

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy