0% found this document useful (0 votes)
11 views8 pages

Experiment 8 CSS

The document outlines Experiment No. 8, which involves downloading and installing Nmap to perform various types of network scans, including port scanning and OS fingerprinting. It details the objectives, hardware and software configurations, and the theoretical background of Nmap, highlighting its capabilities in network discovery and analysis. The document also provides basic commands for using Nmap and concludes with a summary of the experiment's findings.

Uploaded by

yogita.gawdeds
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views8 pages

Experiment 8 CSS

The document outlines Experiment No. 8, which involves downloading and installing Nmap to perform various types of network scans, including port scanning and OS fingerprinting. It details the objectives, hardware and software configurations, and the theoretical background of Nmap, highlighting its capabilities in network discovery and analysis. The document also provides basic commands for using Nmap and concludes with a summary of the experiment's findings.

Uploaded by

yogita.gawdeds
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Experiment No.

8
Aim: Download and install nmap. Use it with different options to scan open ports, perform OS
fingerprinting, do a ping scan, tcp port scan, udp port scan, xmas scan etc.

Objectives:
 Understand port scanning.
 Understand the how nmap helps to scan various ports.
 Explore various nmap options for OS fingerprinting and gathering detailed network
an d remote hosts information.
Outcomes: The learner will be able to
 Install and use nmap and use it for gathering detailed network and remote host
information.
HARDWARE CONFIGURATION :

Device Name :- computer-ThinkCentre


Hardware Model :- Lenovo ThinkCentre neo 50t Gen 3
Memory :- 8.0 Gib
Processor :- 12th Gen Intel® CoreTM i5-12400 × 12
Disk Capacity :- 256.1 GB

SOFTEARE CONFIGURATION : nmap

THEORY:

Nmap (Network Mapper) is a security scanner originally written by Gordon Lyon (also known by
his pseudonym Fyodor Vaskovich) used to discover hosts and services on a computer network, thus
creating a "map" of the network. To accomplish its goal, Nmap sends specially crafted packets to
the target host and then analyzes the responses. Unlike many simple port scanners that just send
packets at some predefined constant rate, Nmap accounts for the network conditions (latency
fluctuations, network congestion, the target interference with the scan) during the run. Also, owing
to the large and active user community providing feedback and contributing to its features, Nmap
has been able to extend its discovery capabilities beyond simply figuring out whether a host is up or
down and which ports are open and closed; it can determine the operating system of the target,
names and versions of the listening services, estimated uptime, type of device, and presence of a
firewall.

Nmap features include:


 Host Discovery – Identifying hosts on a network. For example, listing the hosts which
respond to pings or have a particular port open.
 Port Scanning – Enumerating the open ports on one or more target hosts.
 Version Detection – Interrogating listening network services listening on remote devices to
determine the application name and version number.
 OS Detection – Remotely determining the operating system and some hardware
characteristics of network devices.
Basic commands working in Nmap:
 For target specifications: nmap <target‘s URL or IP with spaces between them>
 For OS detection: nmap -O <target-host's URL or IP>
 For version detection: nmap -sV <target-host's URL or IP>
SYN scan is the default and most popular scan option for good reasons. It can be performed
quickly, scanning thousands of ports per second on a fast network not hampered by restrictive
firewalls. It is also relatively unobtrusive and stealthy since it never completes TCP connections

Installation of Nmap:

$ sudo apt-get install nmap

 nmap -sP 10.0.0.0/24


Ping scans the network, listing machines that respond to ping.
 FIN scan (-sF)
Sets just the TCP FIN bit.
 -sV (Version detection) .
Enables version detection, as discussed above. Alternatively, can use -A, which enables
version detection among other things.

 -sO (IP protocol scan) .


IP protocol scan allows you to determine which IP protocols (TCP, ICMP, IGMP, etc.) are
supported by target machines. This isn´t technically a port scan, since it cycles through IP
protocol numbers rather than TCP or UDP port numbers.
 -O (Enable OS detection) .
Enables OS detection, as discussed above. Alternatively, you can use -A to enable OS
detection along with other things.
 -p port ranges (Only scan specified ports) .
This option specifies which ports you want to scan and overrides the default. Individual port
numbers are OK, as are ranges separated by a hyphen (e.g. 1-1023). The beginning and/or
end values of a range may be omitted, causing Nmap to use 1 and 65535, respectively.

 --top-ports <integer of 1 or greater>


Scans the N highest-ratio ports found in nmap-services file.
 nmap –iflist
host interface and route information with nmap by using ―–iflist‖ option.

Conclusion :
Namp is studied and different types of nmap scans are used to gather host and network
related information.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy