This report explores firewall testing on Kali Linux using Nmap, a network scanning tool. It covers the use of Nmap for detecting vulnerabilities, scanning networks, and testing individual ports. The report also provides a mitigation plan for securing the network.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: FIREWALL TESTING ON KALI LINUX USING NMAP FIREWALL TESTING ON KALI LINUX USING NMAP Name of the Student: Name of the University: Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1FIREWALL TESTING ON KALI LINUX USING NMAP Table of Contents PART A......................................................................................................................................2 Introduction............................................................................................................................2 NMAP....................................................................................................................................2 Performance of the above mentioned tools:...........................................................................6 The firewall testing using Nmap:...........................................................................................7 Mitigation plan.....................................................................................................................10 PART B....................................................................................................................................11 References................................................................................................................................16
2FIREWALL TESTING ON KALI LINUX USING NMAP PART A Introduction The Kali Linux is an operating system that is based on the Debian architecture and is mainly used for vulnerability and security testing by ethical hackers and cyber security specialists. The system helps the users identify the main loopholes in a connected networks. It is a free to use software and is widely used for penetration testing and vulnerability detection purposes. In this report, the use of nmap will be shown. It is a tool which can be used through Kali Linux to scan large networks and single hosts alike. The tool helps in detecting vulnerabilities of a given network and helps the user in identifying the security risks associated with his system. NMAP Nmap tool has a wide number of functions. It is mainly designed as a free and open source network scanner. It can be effectively used to find out services and hosts in a given computer network. It can also be used for effective firewall testing and find out vulnerabilities in the systems connected to a given network. It can be effectively used in a variety of other operating systems like Windows, MacOS and BSD. However, it can be best used in Kali linux to detect vulnerabilities. The four main functions of the Nmap are: 1. OS detection:The Nmap feature can be used to detect the operating systems of computers connected to a certain network. This feature can be used by hackers to detect the operating system type and version of a given computer connected to the network. This will help them plan an attack considering the vulnerabilities of the given operating system.
3FIREWALL TESTING ON KALI LINUX USING NMAP 2. Network scanner:This Nmap feature is used to scan an entire network to detect the computers and devices associated with it. On using this feature, the attacker will be able to detect all the computers connected to the network and also know their IP addresses. This will give the hacker an upper hand while stealing further information.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4FIREWALL TESTING ON KALI LINUX USING NMAP 3. Stealth scanner:This Nmap feature can be effectively used to secretly scan a network and detect the number of open ports associated with that network. The scanner quietly scans the entire network and reports the ports open it the network along with the IP address and the operating system type and version. 4. Maimon scanner:This Nmap feature is another type of scan to detect the open ports in a given network. This feature transmits and receives data to detect the open ports in a given
5FIREWALL TESTING ON KALI LINUX USING NMAP network. This feature can be used to test the individual open ports by sending packets of information to them and reporting the nature of the port based on the results. This is an advanced version of an IP port scanner. A hacker can use this to determine the open ports in a network and find out the system details like operating system type and version.
6FIREWALL TESTING ON KALI LINUX USING NMAP Performance of the above mentioned tools: 1. OS scanner:The Operating system scanner is more or less efficient in detecting the operating system of a computer connected to a given network. It can be used to check the rate of successful detection of a given operating system and then patch up the detected operating system with latest updates to avoid further detection. Once patched it becomes harder for the hacker to detect the system using the OS scanner. The time taken to detect the OS by this scanner is 87.82 seconds as per the test run for this report. 2. Network scanner:This tool can be used for a security purpose to detect the open and uptime IP addresses connected to the network. This will help us determine which devices are visible in the network and take necessary steps to hide them from the hacker. The time taken by the scanner to detect the systems in a given IP subnet as per the test run for this report is 8.50 seconds. 3. Stealth scanner:This feature is a very useful tool of Nmap that can help detect the IP addresses with open ports in a given network. The IP addresses detected with open ports are shownindividuallyandalltheopenportsarementionedclearly.Thiswillhelpthe administrator to close the open ports to prevent any inbound attacks and secure the network. The time taken by the tool to detect the open ports in a network as per the tests run for this report is 48.62 seconds. 4. Maimon scanner:This feature is also quite useful as it does the same job as the stealth scanner but uses data packets to individual ports in a given network to detect the port’s status. This method is more reliable than normal scanner as if a reply to a packet is not received, the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7FIREWALL TESTING ON KALI LINUX USING NMAP port is deemed to be open and filtered. This will again aid the administrator to further seal the given open ports. The time taken by the Maimon scanner as per the tests run for this report is 4.36 seconds for the port 135/tcp. The firewall testing using Nmap: 1. Find open ports in a network with stealth scanner:
8FIREWALL TESTING ON KALI LINUX USING NMAP 2. Test the individual ports with Maimon scanner: Port 135: Port 445:
9FIREWALL TESTING ON KALI LINUX USING NMAP Port 80: 3. Try to find out the operating system version of the device attached to the open ports: The above steps shows the firewall testing of the given network. This has been performed using VMware software to run the Kali Linux and used the bridged network connection of the host machine.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10FIREWALL TESTING ON KALI LINUX USING NMAP Performing the above steps will help the user detect the open ports visible in a network through a given default firewall. The firewall in this operating system is quite weak as it is designed for testing and security purposes. The user can then use the result to patch the operating systems of the shown devices and secure the network by closing the above seen open ports. Mitigation plan The threats that arises as seen from the given network scan can be mitigated by following the mentioned steps: 1. The network should be patched and made more secure to limit the visibility of the other devices connected to the network. 2. The firewall is the main shield against the internet. Therefore, the firewall should be updated to make the penetration testing of the firewall useless. 3. The open ports are a big threat to the company as it exposes all the system device information and network addresses. It even exposes the model number of the device. Therefore, all the open ports must be closed to increase security.
11FIREWALL TESTING ON KALI LINUX USING NMAP PART B The following tasks related to Firewall configuration in Kali Linux are given below: 1.Check the firewall status
12FIREWALL TESTING ON KALI LINUX USING NMAP 2. Enable or disable the firewallaccordingly 3. Allow services such as TCP, SSH and samba using their port number orname
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13FIREWALL TESTING ON KALI LINUX USING NMAP 4. Verify the firewall rules after adding the aboveservices 5. Secure a web server by blocking HTTP(80) service and allowing HTTPS(443) service only 6. Allow a range of ports from 20 to 80 and deny a range of ports from 500 to100
14FIREWALL TESTING ON KALI LINUX USING NMAP 7. Verify the firewallrules 8. Allow HTTP from a specific subnet to access your webservices 9. Block connections to a networkinterface
15FIREWALL TESTING ON KALI LINUX USING NMAP 10. Final firewall status
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
16FIREWALL TESTING ON KALI LINUX USING NMAP References Buchanan,C.and Ramachandran,V.,2017.KaliLinuxWirelessPenetrationTesting Beginner's Guide: Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack. Packt Publishing Ltd. Iyamuremye, B. and Shima, H., 2018, April. Network security testing tools for SMEs (small andmediumenterprises).In2018IEEEInternationalConferenceonAppliedSystem Invention (ICASI)(pp. 414-417). IEEE. Johansen, G., Allen, L., Heriyanto, T. and Ali, S., 2016.Kali Linux 2–Assuring Security by Penetration Testing. Packt Publishing Ltd. Kaur, G. and Kaur, N., 2017. Penetration Testing--Reconnaissance with NMAP Tool. International Journal of Advanced Research in Computer Science,8(3). Luo, S., Wu, J., Li, J. and Guo, L., 2016. A multi-stage attack mitigation mechanism for software-definedhomenetworks.IEEETransactionsonConsumerElectronics,62(2), pp.200-207. Najera-Gutierrez, G. and Ansari, J.A., 2018.Web Penetration Testing with Kali Linux: Explore the methods and tools of ethical hacking with Kali Linux. Packt Publishing Ltd. Rahalkar, S., 2019. Introduction to NMAP. InQuick Start Guide to Penetration Testing(pp. 1-45). Apress, Berkeley, CA. Wang, B., Zheng, Y., Lou, W. and Hou, Y.T., 2015. DDoS attack protection in the era of cloud computing and software-defined networking.Computer Networks,81, pp.308-319.