logo

Definitive Guide to Nmap (Network Mapper)

   

Added on  2022-08-12

11 Pages2038 Words41 Views
Running head: Ethical hacking and penetration testing
Ethical hacking and penetration testing
Name of the Student
Name of the University
Author Note

Ethical hacking and penetration testing 1
Table of Contents
Nmap:.........................................................................................................................................2
Lab environment:.......................................................................................................................2
Zenmap interface:.......................................................................................................................4
Nmap scan: Intense scan all TCP ports:.....................................................................................5
Nmap ping scan:.........................................................................................................................7
Nmap comprehensive scan:........................................................................................................7
Bibliography:............................................................................................................................10

Ethical hacking and penetration testing 2
Nmap:
Nmap or Network Mapper is a free and open-source tool that is made used for
scanning of vulnerability and discovering network. This is made use of by network
administrators for identifying what devices are being run on the system, finding out the
available hosts as well as the services that are offered (Coffey et al., 2018). Nmap can also be
made use of for opening ports as well as detecting various security risks. This also finds
application in monitoring single hosts along with vast networks that encompass numerous
devices as well as multitude of subnets. Nmap has come a long way in the last few years and
is said to be extremely flexible. It is a port-scan tool that gathers information by sending raw
packets to various ports of the system (Rahman et al., 2016). This listens for responses at the
same time determining whether the ports are open, filtered or maybe closed in some way or
the other for instance a firewall. The other terms that are often used in place of port scanning
are port discovery or enumeration.
The packets sent by Nmap give back IP addresses along with certain data that in turn
helps to identify the network allowing the user to develop hardware as well as software
inventory (Zhang et al., 2016). The official GUI version of Nmap security scanner is Zenmap
which is basically a free, multi platform (Linux, Windows, BSD, Mac OS X etc.) as well as it
is an open source app that aims in making the Nmap easy for the beginners to utilize while
providing some of the features that are advanced for experiencing Nmap. The scans those
have already been done can be saved as profiles in Zenmap for making them easy to run in a
repeat mode. The Zenmap can be download from https://nmap.org/zenmap/ (Nmap: the
Network Mapper - Free Security Scanner, 2020).
Lab environment:
Nmap version:

Ethical hacking and penetration testing 3
The Nmap version is 7.80.
The IP address of the system is: 10.0.2.15
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 10.0.2.15 netmask 255.255.255.0 broadcast 10.0.2.255
inet6 fe80::254f:6ca9:1ea6:1547 prefixlen 64 scopeid 0x20<link>

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Overview of Network Security
|11
|1474
|434

Network Security Tools: Nmap and Metasploit
|9
|1824
|206