Network Security Analysis using Nmap: A Comprehensive Report

Verified

Added on  2025/05/03

|13
|1512
|433
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
MITS5004
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Introduction.................................................................................................................................................3
Features.......................................................................................................................................................4
Techniques..................................................................................................................................................5
Experiment..................................................................................................................................................7
Conclusion.................................................................................................................................................12
References.................................................................................................................................................13
Table of Figures
Figure 1: TCP scan command......................................................................................................................7
Figure 2: result of command........................................................................................................................7
Figure 3: Service Detection.........................................................................................................................8
Figure 4: result............................................................................................................................................8
Figure 5: Command.....................................................................................................................................8
Figure 6: Result...........................................................................................................................................8
Figure 7: command......................................................................................................................................9
Figure 8: Vuln. Result.................................................................................................................................9
Figure 9: vuln result 2..................................................................................................................................9
Figure 10: vuln result.................................................................................................................................10
Figure 11: command..................................................................................................................................10
Figure 12: result.........................................................................................................................................10
Figure 13: Result.......................................................................................................................................11
Document Page
Introduction
Every security analysis requires to gather various information related to the attacker and the machine that
is attacked or being attacked. At the beginning of every attack, the first step consists of gathering all the
required information related to the attacker machine and the network. This information helps to design an
effective blueprint for the attack that can be followed while performing the attack to take the attack into
the correct direction. This information is collected with the help of a tool named as NMAP. This is an
opensource tool that preferably used by the various security professionals in order to collect various
information such as open port, number of hops, os type and more.
Document Page
Features
As being an opensource tool for security analysis NMAP plays a vital role in any security research and
analysis. NMAP comprises of various features that helps in detecting various flows and possibilities of a
device that can be exploited. These are the various features that provide various valuable features such as:
1. Mapping of Network:
NMAP provides the feature to identify and create a complete map of the network on which the
targeted machine is deployed. This feature provides information related to the network that
consists of a number of hosts, devices and more. This feature of NMAP provides the complete
Information related to the topology and architecture of the network. That helps to determine the
flow of packet in the network.
2. Detection of Operating System:
NMAP provides the feature to identify the Operating System running over the targeted system.
This Feature of NMAP is useful as the information provided by this feature can help to identify
the open flows and vulnerabilities in the targeted system and can also help to identify appropriate
security patch for the device.
3. Auditing of Services:
NMAP provides the feature to generate or to establish an audit over the system on security
analysis is running. This feature of NMAP is useful to create security reports for the targeted
system. This feature helps security professionals to develop an adequate report for the security
analysis.
4. Detection of running Services:
NMAP provides the feature to identify all the services that are running over the targeted system.
This feature of NMAP is useful as it provides all the information related to the services as this
information can help to choose an appropriate payload to exploit the service running over the
targeted system.
5. Port Scanning:
NMAP provides the feature to identify all the open and closed parts of the targeted system. This
feature of NMAP provides the information related to various parts of the machine with the
services running over them that with the status and port number of the port on which the service
is running. ( Mandal et al., 2016)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Techniques
NMAP provides various techniques that can be used while performing security analysis over the targeted
system.
1. Authentication scan:
This technique of NMAP provides information related to the authentication of the procedure of
the targeted system. This type of scan is used to identify the time taken to accept the packet
requested to the required system.
2. Brute Scan:
This technique of the NMAP provides the functionality to identify the desired details and
information by running the bulk of services identification command as of hit and trial method.
3. DOS Scan:
This technique of the NMAP provides the functionality to identify the vulnerability related to the
DOS attack and used to perform the DOS attack over the targeted system.
4. Broadcast scan:
This technique of the NMAP provides the functionality to identify the detailed information
related to the targeted system by sending the broadcasting packets to the targeted system.
5. Exploit scan:
This technique of the NMAP provides the functionality to identify the detailed information
related to the targeted system that helps to run the adequate exploit over the targeted system to
gain access to the system.
6. Malware Scan:
This technique of the NMAP provides the functionality to identify the detailed information
related to the targeted system by sending the malware packets over the targeted system to identify
the vulnerabilities that can be exploited with the help of malware.
7. Safe Scan:
This technique of the NMAP provides the functionality to identify the detailed information
related to the targeted system by sending the packets that can not be detected by any of the
security devices. (Najera-Gutierrez et al., 2018)
8. Vulnerability scan:
This technique of the NMAP provides the functionality to identify the detailed information
related to the targeted system by sending packets to identify the vulnerabilities present over the
targeted system. (Johansen et al., 2016)
9. Fuzzer scan:
Document Page
This technique of the NMAP provides the functionality to identify the detailed information
related to the targeted system by sending packets to identify fuzzing related system over the
forms present to the targeted system.
10. Discovery scan:
This technique of the NMAP provides the functionality to identify the detailed information
related to the targeted system by sending packets that were sent to the targeted system to detect
identify all the information of the system.
Document Page
Experiment
After analyzing and gathering all the required information over NMAP. This gathered information is
partially performed to gain various detailed information realty to the practical. This practical is performed
in a controlled environment by executing the commands in NMAP over the targeted system. This practice
is completely performed on Kali Linux as this system provides the integration of NMAP by default. Here
are some requirements that are required to be fulfilled before implementing the experiment over the
targeted system.
Requirement:
1. Base Machine as Windows, Linux or Mac
2. Kali Linux ISO
3. VM Ware
After collection of all the requirements the practical of the NMAP is started by entering the following
commands in the system:
1. TCP SCAN:
This is the first command that is tested over the targeted system to identify the information
related to all the TCP ports established over the targeted system. This command is very useful as
it provide the complete information related to all the open ports available on the targeted machine
with the detailed information of services running on it.
Figure 1: TCP scan command
Result:
Figure 2: the result of the command
2. Service Detection:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
This is the second command that is executed is to identify all the services running on the targeted
system. This command will provide the detailed information over all the services running on the
targeted system.
Command:
Figure 3: Service Detection
Figure 4: Result
3. OS Detection:
This is the next command that is executed to the targeted system to identify the operating system
with the detailed information related to the operating system version, service pack info, type and
more. (Hixon et al., 2017)
Command:
Figure 5: Command
Result:
Document Page
Figure 6: Result
4. Vuln. Scan:
This is the next command that is executed over the targeted system to identify the vulnerability in
the targeted system. This command provides the information with the vulnerability name,
version, service name and more.
Command:
Figure 7: command
Result:
Figure 8: Vuln. Result
Document Page
Figure 9: vuln result 2
Figure 10: vuln result
5. Dos Scan:
This is the next command that is executed over the system to perform the dos attack over the
targeted system. (Norman et al., 2016)
Command:
Figure 11: command
Result:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 12:Result
Figure 13: Result
Document Page
Conclusion
This report talks about the Nmap which is the source of gathering information about cybersecurity. It
helps in identifying various features for a cyber-attack. Below is the report, various experiments have
been performed which are being highlighted so that results can be easily analyzed. These experiments
help in identifying the capabilities of the Nmap in order to resolve various issues and related to security
attacks and the threat from external and internal sources. Some of the techniques have also been discussed
in this report regarding Nmap. Requirements for implementing the experiments have also been explained
in detail.
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]