Da 02
Da 02
Name:-Kumar raja
Reg.No-20BIT0213
Host
2.Nmap Ping Scan
3.Scan specific ports or scan entire port ranges on a local or remote server
All 65535
Specific port
5. Scan IP ranges
Nmap to scan entire CIDR IP ranges:
Scan 14 consecutive IP ranges:
Wildcards to scan:
Exercise SET
Using nmap to conduct a reconnaissance of your network
1. Use a broad ping scan to determine the hosts that are "up" on a portion of your network.
2. Conduct an IP protocol ping (switch -PO / -PS / -PU) on the Common Network hosts.
a. How many TCP ports are open on each?
b. Are there any UDP ports open on any machine?
3. Conduct an IP protocol ping on yourself.
a. How many ports are open?
b. Are the results different than that attained with the IP protocol ping? Explain.
[Hint: read the OS Detection section of the man pages and again note that you will need to use sudo to have
sufficient privilege.]
4. Type the following commands in zenmap. Use different IP address and generate a report. Take a screen shot
and write your comments on each command.
a) Scan a Host to Detect Firewall : namp –sA 192.168.0.64
b) scan a host if it is protected by any packet filtering software or Firewalls : nmap –PN 192.168.0.101
c) Complete a scan in Stealth Mode : nmap -sS 192.168.0.64
d) Identify Host Names : nmap -sL 192.168.0.1
e) Scan IPv6 Addresses : nmap -6 ::ffff:c0a8:1
f) Create Decoys while scanning : nmap -D 192.168.0.1,192.168.0.2,...
g) Scan remote Hosts using SCTP : nmap -sZ --top-ports 20 -T4 192.168.1.1/24
h) Scan output in xml format : nmap -oX scan-report.xml -n 192.168.1.1
i) Save nmap outputs : nmap -n 192.168.1.1 > scan-report
j) Using multiple script categories : nmap --script discovery,brute 192.168.1.1
a.
b.
c.
d.
e.
f.
g.
h.
i.
j.