Reference no: EM133791181
Remotely determining the operating system and some hardware characteristics of network devices
Aim: Download and install nmap. Use it with different options to scan open ports, perform OS fingerprinting, do a ping scan, tcp port scan, udp port scan, etc.
Objectives: objective of this module to learn nmap installation & use this to scan different ports.
Outcomes: The learner will be able to:-
Scan the network using scanning techniques available in NMAP.
Use current techniques, skills, and tools necessary for computing practice Hardware / Software Required : NMAP Tool
Theory:
Nmap (Network Mapper) is a security scanner originally written by Gordon Lyon (also known by his pseudonym Fyodor Vaskovich) used to discover hosts and services on a computer network, thus creating a "map" of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyzes the responses. Unlike many simple port scanners that just send packets at some predefined constant rate, Nmap accounts for the network conditions (latency fluctuations, network congestion, the target interference with the scan) during the run. Also, owing to the large and active user community providing feedback and contributing to its features, Nmap has been able to extend its discovery capabilities beyond simply figuring out whether a host is up or down and which ports are open and closed; it can determine the operating system of the target, names and versions of the listening services, estimated uptime, type of device, and presence of a firewall.
Nmap features include:
Host Discovery - Identifying hosts on a network. For example, listing the hosts which respond to pings or have a particular port open.
Port Scanning - Enumerating the open ports on one or more target hosts.
Version Detection - Interrogating listening network services listening on remote devices to determine the application name and version number.
Basic commands working in Nmap
For target specifications:
nmap <target's URL or IP with spaces between them> For OS detection:
nmap -0 <target-host's URL or IP>
For version detection:
nmap -sV <target-host's URL or IP>
After the installation of nmap:> sudo apt-get install nmap
SYN scan is the default and most popular scan option for good reasons. It can be performed quickly, scanning thousands of ports per second on a fast network not hampered by restrictive firewalls. It is also relatively unobtrusive and stealthy since it never completes TCP connections.
Conclusion:
Network scanning provides a wealth of information about the target network, which is valuable regardless of whether you're trying to attack the network or protect it from attack. While performing a basic scan is a simple matter, the network scanners covered in this experiment provide a wide array of options to tweak your scan to achieve the best results. Nmap is used to detect IP spoofing and port scanning.
Questions:
Submit the screenshots of your lab and the answers to the below questions in a document file (.doc/.pdf)
What is Host Discovery?
How to use nmap to detect remote OS?
How to check whether NMAP already installed or not?
What are the phases of NMAP scanning?