ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

NMAP: Cyber Security

Verified

Added on  2023/06/03

|6
|502
|339
AI Summary
This paper discusses the use of NMAP, a networking tool used for scanning networks to determine connected hosts and services. It specifically focuses on using NMAP to quantify a home network and identify the type and number of systems connected to it. The paper also discusses the acceptable use policy for NMAP.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: NMAP
NMAP: CYBER SECURITY
(Name)
(Tutor’s Name)
(Unit Title)
(Date)

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
NMAP 2
Introduction
NMAP is one of the networking tools which is used to scan networks so as to determine
those hosts which are up and are connected to what services. The network tool supports scanning
techniques like TCP connect, ftp proxy, null scan, and SYN sweep. This paper is used uses
NMAP tool so as to quantify a home network. Specifically, the paper will use NMAP to identify
the type and number of systems which are attached to the organizational network. Second,
NMAP will be used to determine what and who is on the network (Lyon, 2017).
The type and number of systems on the network
This command requires one to find the number of IP addresses that my home network is
connected to. To achieve this target, one uses the command –sn; this is a type have a meaning of
port scan (Arkin, 2008). This command performs a port scan by doing the following result was
found as shown by screen shot below
Figure 1: Who is the on the network
Document Page
NMAP 3
By typing the command, nmap –sn 192.168.88.213/24 it is evident that in my home
network there is only five host which is on my network. The result was displayed after 4.96
seconds as shown from the figure above. There are five hosts of types router board, techno
mobile limited, Liteon technology, and TP technologies.
What is on then network
From then figure above (fig 1) it is evident that there five gadgets: The first device found
on my network was a router with an ip address of 192.168.88.1, a techno mobile was also found
on my network with an Ip address of 192.1689.88.209, TP link device was also found on my
network with an IP address of 192.168.88.213 and a device made of Liteon technology was also
found with an IP address of 192.168.88.211
Document Page
NMAP 4
Who is on the network
The following figure depicts who is on the network
Figure 2: Commands used

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NMAP 5
Figure 3: shows who is on the network the highlighted one
The acceptable use policy
Nmap network scanning tool is an open source. For this scenario nmap copyright have
been respected. This project has implemented Nmap in accordance with legal rights stated in
nmap website so as to provide a pre-emptive thought and the level of knowledge which is said to
safe by the nmap organization.
Document Page
NMAP 6
References
Arkin. (2008). Network scanning techniques. Publicom Communications Solutions., 34-78.
Lyon. (2017). Nmap network scanning. The official Nmap project guide to network discovery
and security scanning, 23-56.
1 out of 6
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]