0% found this document useful (0 votes)
6 views5 pages

CN - Exp 4

Uploaded by

ROWDY YT
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views5 pages

CN - Exp 4

Uploaded by

ROWDY YT
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

******************************************************************

EXPERIMENT NO. 4
Name :- Class : T.E. COMPUTER
SUB : COMPUTER NETWORKS Roll No :
Date of conductance : /09/2023 Date of submission : /09/2023
******************************************************************
Aim : Perform network discovery using discovery tools Nmap.
Theory:-
Nmap -
Nmap is a network mapper that has emerged as one of the most popular, free network
discovery tools on the market. Nmap is now one of the core tools used by network
administrators to map their networks. The program can be used to find live hosts on
a network, perform port scanning, ping sweeps, OS detection, and version detection.
At its core, Nmap is a network scanning tool that uses IP packets to identify all the
devices connected to a network and to provide information on the services and
operating systems they are running.
The program is most used via a command-line interface (though GUI frontends are
also available) and is available for many different operating systems such as Linux,
Free BSD, and Gentoo. Its popularity has also been bolstered by an active and
enthusiastic user support community.

Nmap features include:


• Host Discovery – Identifying hosts on a network. For example, listing the
hosts which respond to pings or have a particular port open.
• Port Scanning – Enumerating the open ports on one or more target hosts.
• Version Detection – Interrogating listening network services listening on
remote devices to determine the application name and version number.
• OS Detection – Remotely determining the operating system and some
hardware characteristics of network devices.
Basic commands working in Nmap:
• For target specifications: nmap <target’s URL or IP with spaces between
them>
• For OS detection: nmap -O <target-host’s URL or IP>
• For version detection: nmap -sV <target-host’s URL or IP>
Implementation-
1. Intense Scan:

Intense scan is a very detailed, comprehensive scan. Logically, this means the intense
scan may take up much more time scanning than the others will probably take,
though it may come in useful when you want accurate results. This scan does the
following scans and detections to reach the most accurate result as possible
• OS detection
• Version detection
• Script scanning
• Traceroute

Output :-
2. Ping Scan

Ping scan is a quick type of scan that only finds out whether the target is up—it does
not scan for ports. This scan is potentially useful in situations when you're unsure
whether the target is up or not to perform more time-consuming actions on it and not
waste the time waiting for the results.

Output :-
3. Quick Scan

Quick scan is slightly faster than the Intense scan by limiting the number of TCP
ports scanned to only the top 100 most common TCP ports and by using a more
aggressive timing template. This scan, also known as quick scan, plus also performs
OS detection along with the version detection (that was explained a few pages ago).
The best example of usage would be mainly for the OS detection itself, as it's the
fastest way to retrieve OS and version info in the shortest amount of time,
considering the other scans (Intense and Comprehensive scan) take more time.

Output :-
4. Quick Traceroute
Nmap traceroute is a great tool to diagnose connectivity problems such as delays or
lack of access, if a specific hop is blocking you, through Nmap traceroute you can
even discover your target hosting service or identify additional targets according to
your goals.

Conclusion: Thus, we have studied different options to scan ports in Nmap.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy