0% found this document useful (0 votes)
21 views11 pages

Isaa Da

Information Security Analysis and Audit

Uploaded by

Vineet Choudhary
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views11 pages

Isaa Da

Information Security Analysis and Audit

Uploaded by

Vineet Choudhary
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Basic:

-sn

Disable port scanning. Host discovery only.

-PO

Leaving off end port in range makes the scan go through to port 65535

-PS

TCP SYN discovery on port x. Port 80 by default

-PU

UDP discovery on port x. Port 40125 by default

-sO

Disable port scanning. Host discovery only

-sV

Attempts to determine the version of the service running on port

-O

Remote OS detection using TCP/IP stack fingerprinting


Using n-map to conduct a reconnaissance of your network

1. Use a broad ping scan to determine the hosts that are "up" on a portion of your network.

Enter the following scans & record the results


o n-map -n -sn 10.27.x.0/24

O n-map -n -sn 10.27.0.0/24


a. )Why is the -n option used? What happens if you rerun this command without the -
n option? (Try it) .

Time elapsed is 5.94 s which is more because of the DNS resolution is also done

b.)What does the /24 represent?

Answer :- Represents the number of bits that is contained in the network and is vital information
for network engineers to calculate addresses.

2. Conduct an IP protocol ping (switch -PO / -PS / -PU) on the Common Network hosts.

a.)How many TCP ports are open on each?


b)Are
there any UDP ports open on any machine?
Answer : No None

3. Conduct an IP protocol ping on yourself.

a. How many ports are open?

b. )Are the results different than that attained with the IP protocol ping? Explain.
Answer : Yes they are very different because the hosts are different.

[Hint: read the OS Detection section of the man pages and again note that you will need to
use sudo to have sufficient privilege.]

a.) What operating system does n-map think your Server VM is running?
4. ) Type the following commands in zen-map. Use different IP address and
generatea report.Take a screen shot and write your comments on each command.

a) Scan a Host to Detect Firewall : n-amp –sA 192.168.0.64

b) scan a host if it is protected by any packet filtering software or Firewalls : n-map –PN 192.168.0.101
c) Complete a scan in Stealth Mode : n-map -sS 192.168.0.64

d) Identify Host Names : n-map -sL 192.168.0.1


e) Scan IPv6 Addresses : n-map -6 ::ffff:c0a8:1

f) Create Decoys while scanning : n-map -D 192.168.0.1,192.168.0.2,…


g) Scan remote Hosts using SCTP : n-map -sZ --top-ports 20 -T4 192.168.1.1/24

h) Scan output in xml format : n-map -oX scan-report.xml -n 192.168.1.1


i) Save n-map outputs : n-map -n 192.168.1.1 > scan-report

j) Using multiple script categories : n-map --script discovery,brute 192.168.1.1

You might also like