Network Security Vulnerability Assessment using Nmap in Kali Linux

Verified

Added on  2025/04/28

|16
|1515
|124
AI Summary
Desklib provides past papers and solved assignments for students. This report details Nmap's use in network security.
Document Page
Security vulnerability tool using Kali
Linux
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Introduction....................................................................................................................................................3
Features of NMAP.........................................................................................................................................4
Techniques used by NMAP:..........................................................................................................................7
Experiment.....................................................................................................................................................8
Conclusion...................................................................................................................................................15
References....................................................................................................................................................16
Table of Figures
Figure 1: port scanning..................................................................................................................................4
Figure 2: network mapping............................................................................................................................5
Figure 3: os detection.....................................................................................................................................5
Figure 4: Nmap port scanning........................................................................................................................9
Figure 5: Nmap service detection................................................................................................................10
Figure 6: Nmap OS detection scan..............................................................................................................11
Figure 7: Nmap vulnerability scan...............................................................................................................12
Figure 8: nmap vulnerability scan 2.............................................................................................................12
Figure 9: nmap vulnerability scan 3.............................................................................................................13
Figure 10: Nmap dos scan............................................................................................................................14
Figure 11: Nmap dos scan 2.........................................................................................................................14
1
Document Page
Introduction
Nmap is worlds most widely used and preferred information gathering tool in cyber security. This is an
open source tools that provide various features and techniques to perform cyber security attack (Ferranti,
2019). This report will provide the detailed information related to the all the features of the tool. This
report will also provide the complete description of techniques of the tool. This report will also provide
the complete information related to the experiment performed in order to highlight the various features
and capabilities of the Nmap in a network to secure the targeted system form security threats and attack
from internal or external sources.
2
Document Page
Features of NMAP
NMAP provide wide range of services to detect vulnerabilities in the system. NAMP being an open
source tool contains various different features that can detect any flows in the network in order to secure
the network and targeted system (Ferranti, 2019). Here are the features of NMAP:
1. Port Scanning:
Port Scanning is a feature of Nmap used to detect all the open ports in the targeted system. This
technique is mostly used by the hackers to find out a loophole in the targeted system to find out a
way to access the system for intrusions. This technique helps to protect the system from hackers
by blocking any unused ports in the system.
Figure 1: port scanning
2. Network mapping:
This feature of Nmap is used to map the complete network of the targeted system it provides the
complete details of the network. This technique provides the details related to the network
topology, its diagram, flowchart, devices details and various other details. This technique sends
various probe packets to determine all the details of the network.
3
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 2: network mapping
3. OS detecting:
OS detection is the feature of Nmap that provide the detailed information of the Operating system
of the targeted system. This technique provides the clear and complete information of OS such as
its version, name, kind, name of the system and more.
Figure 3: os detection
4. Service Discovery:
4
Document Page
Service Discovery is the feature of Nmap that provides the detailed information of the all the
services running in the network or in the targeted system. This technique of the NMAP is one of
the most important technique for the hackers to identify the services to gain unauthorised access
to the system by tempering of exploiting the services over the targeted system. This technique
also helps to protect the system form being hack by identifying and implementing security
patches to the system.
5. Service Auditing:
Service auditing is one of the most widely used feature of Nmap by the security professionals in
order to protect the system and device from any intrusion in the network or in the targeted system
by the hacker (WonderHowTo, 2019).
5
Document Page
Techniques used by NMAP:
1. Auth scan:
This technique provides the detailed request detailed over the targeted system. This technique of scan
provides the complete request path of the packet that is sent to the targeted system. This scan
provides the complete description of all the steps from where the packet had gone through to targeted
system (Lyon, 2019).
2. Broadcast scan:
This scan sends broadcast packet to the system the targeted system to identify all the broadcast
services.
3. Brute scan:
This scan performs various guessing scans to detect the required information of the targeted system.
4. Discovery scan:
This scan is performed to over the targeted system to discover various details that comprises of
various details such as banner, asn query and more.
5. Dos Scan:
This scan is performed over the targeted system to perform dos attack to the targeted system.
6. Exploit scan:
This scan is performed over the targeted system to run exploit over the targeted system by identifying
the vulnerability of the system.
7. Fuzzer scan:
This scan is performed over the targeted system to in a form of fuzzing against forms found in the
devices.
8. Intrusive scan:
This scan is performed over the targeted system to gain the access to the targeted system by intruding
the vulnerability of the system.
9. Malware scan:
This scan is performed over the targeted system by sending malware to the targeted system.
10. Safe scan:
This scan is performed over the targeted system by the sending the packets that can be undetected in
to the network intrusions detection systems (Poojary, 2019).
11. Vuln scan:
This scan is performed over the targeted system to identify vulnerabilities in the targeted systems.
6
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Experiment
To demonstrate the functionality and features of NMAP an experiment is performed. This experiment had
outlined some basic scan commands that can be used to determine any information form the targeted
system. This experiment is done by setting up kali Linux over the virtual machine and by scanning the
host machine IP address using the kali Linux. This experiment comprises of performing scans such as
TCP scan, port finding, os detection, vulnerability finding, dos attract vulnerability finding.
These scans are preformed as these are the most common types of scans that provides detailed
information of the network or the targeted system.
Requirements:
To successfully perform the experiment there need to full fill these requirements such as:
1. Windows 10 as base machine.
2. Kali Linux
3. Virtual box, vm ware
Once all the requirements are gathered there required to open the NMAP in the kali Linux and start
scanning by entering these commands:
1. Nmap Tcp scan:
Command: Nmap 192.168.43.157
This command provides the information related to the open ports on the targeted system with the
information related to the port number with respect to the service running on them.
7
Document Page
Figure 4: Nmap port scanning
2. Nmap service detection:
Command: nmap -sV 192.168.43.157
This command is executed to perform the service detection scan on the targeted system. This scan
provided the detailed information of all the services running on the targeted system on every open
port of the targeted system. This command also provided the detailed information related to OS
of targeted machine and more.
8
Document Page
Figure 5: Nmap service detection
3. Nmap OS detection scan:
Command: nmap -O 192.168.43.157
This command is executed over the targeted machine to gather the detailed information related to
the operating system version, their version, and various other related information. This command
is helpful to gather the system related information that helps in finding the correct patch for the
system in order to secure the system.
9
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 6: Nmap OS detection scan
4. Nmap vulnerability scan:
Command: nmap -v –script vuln 192.168.43.157
This command is executed as to gain the information related to the vulnerabilities found in the
system. This command provides the detailed information related to the all the vulnerabilities that
can be exploited by a hacker in order to compromise the system and access unauthorised
information.
10
Document Page
Figure 7: Nmap vulnerability scan
Figure 8: nmap vulnerability scan 2
11
chevron_up_icon
1 out of 16
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]