This paper discusses the use of NMAP, a networking tool used for scanning networks to determine connected hosts and services. It specifically focuses on using NMAP to quantify a home network and identify the type and number of systems connected to it. The paper also discusses the acceptable use policy for NMAP.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
NMAP2 Introduction NMAP is one of the networking tools which is used to scan networks so as to determine those hosts which are up and are connected to what services. The network tool supports scanning techniques like TCP connect, ftp proxy, null scan, and SYN sweep. This paper is used uses NMAP tool so as to quantify a home network. Specifically, the paper will use NMAP to identify the type and number of systems which are attached to the organizational network. Second, NMAP will be used to determine what and who is on the network(Lyon, 2017). The type and number of systems on the network This command requires one to find the number of IP addresses that my home network is connected to. To achieve this target, one uses the command –sn; this is a type have a meaning of port scan(Arkin, 2008). This command performs a port scan by doing the following result was found as shown by screen shot below Figure 1:Who is the on the network
NMAP3 By typing the command, nmap –sn 192.168.88.213/24 it is evident that in my home network there is only five host which is on my network. The result was displayed after 4.96 seconds as shown from the figure above. There are five hosts of types router board, techno mobile limited, Liteon technology, and TP technologies. What is on then network From then figure above (fig 1) it is evident that there five gadgets: The first device found on my network was a router with an ip address of 192.168.88.1, a techno mobile was also found on my network with an Ip address of 192.1689.88.209, TP link device was also found on my network with an IP address of 192.168.88.213 and a device made of Liteon technology was also found with an IP address of 192.168.88.211
NMAP4 Who is on the network The following figure depicts who is on the network Figure 2:Commands used
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
NMAP5 Figure 3:shows who is on the network the highlighted one The acceptable use policy Nmap network scanning tool is an open source. For this scenario nmap copyright have been respected. This project has implemented Nmap in accordance with legal rights stated in nmap website so as to provide a pre-emptive thought and the level of knowledge which is said to safe by the nmap organization.
NMAP6 References Arkin. (2008). Network scanning techniques.Publicom Communications Solutions., 34-78. Lyon. (2017). Nmap network scanning.The official Nmap project guide to network discovery and security scanning, 23-56.