nmap scanning

Active Reconnaissance

Perform this reconnaissance on an authorized internal network.  Ensure you have permission prior to scanning since it could be perceived as a precursor of an attack.

*NOTE: <IP_Address> represents the IP address from “scanme.org” or an IP address from a device on your network.

  • Download the most current version of Nmap from https://nmap.org/download.html.
  • Open a command prompt and go to the directory that Nmap was installed.
  • Run nmap –h from the command line to see the various options.
  • Please notice that Nmap has many different options. Review and find the option for a full connect scan.

Enter the results here: __________.

  • Review and find the option for a stealth scan.

Enter the results here: __________.

  • Review and find the option for a UDP scan.

Enter the results here: __________.

  • Review and find the option for a fingerprint scan.

Enter the results here: __________.

  • Perform a full connect scan on one of the local devices you have identified on the private network. The syntax is nmap –sT <IP_Address>

Enter the results here: __________.

  • Perform a stealth connect scan on one of the local devices you have identified on the private network. The syntax is nmap –sS <IP_Address>

Enter the results here: __________.

  • Perform a full connect scan on one of the local devices you have identified on the private network. The syntax is nmap –sU <IP_Address>

Enter the results here: __________.

  • Perform a fingerprint connect scan on one of the local devices you have identified on the private network. The syntax is nmap –O <IP_Address>

Enter the results here: __________.

  • Observe the results of each scan. Could Nmap successfully identify the system?  Were the ports it identified correct?

Leave a Reply

Your email address will not be published. Required fields are marked *