0% found this document useful (0 votes)
4 views3 pages

nmap-Overview

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views3 pages

nmap-Overview

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Nmap Basics

Summary
Nmap is free, open-source software used by most technicians responsible for network functionality or
network security. Nmap can be used for network discovery, security auditing, service mapping and
more. A basic understanding and the ability to use this versatile tool is very important to anyone seeking
to learn more about cybersecurity.

Learning Outcomes
• Describe TCP/IP Network Communications.
• Discuss Nmap Host Discovery.
• Discuss Nmap Port Mapping.
• Discuss Using Nmap to Identify Target Service and Operating System Data.
• Use Nmap to Perform Network Mapping.

Systems
• Kali Linux – Hacker
o Username: student; Password: Password01
• Industrial Control System
o Windows XP – OPC Server
▪ Username: student; Password: Password01
o Windows XP – HMI
▪ Username: student; Password: Password01
o PLC/Pump/Sensors
▪ Username: root; Password: Password01
• pfSense – Router/Firewall
o Username: admin; Password: Password01

General Lab
In this lab students will use nmap to perform basic and advanced network scanning. Multiple methods
for accessing common built-in nmap resources will be demonstrated. Students will learn to modify
nmap's behavior using switches. Students will learn to use caution when using nmap by observing how it
can disrupt system functionality.
Setup and Deploy
PLC HMI System OPC Server Hacker
Tank,
pump &
sensor

10.0.255.103 10.0.255.102 10.0.255.100


10.0.255.101 IP from DHCP
Modbus/TCP Modbus/TCP OPC-DA

10.0.255.1/24

Router/Security Appliance
For Further Information
National Institute of Standards and Technology (NIST) (May 2015). Guide to Industrial Control Systems
(ICS) Security, NIST Special Publication 800-82 Revision 2. Retrieved from
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf.

Nmap Series. HackerSploit. January 11, 2021. Video,


https://www.youtube.com/playlist?list=PLBf0hzazHTGM8V_3OEKhvCM9Xah3qDdIx.

The Official Nmap Project Guide to Network Discovery and Security Scanning. Insecure.COM LLC. 2022.
https://nmap.org/book/.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy