Active Reconnaissance
Perform this reconnaissance on an authorized internal network. Ensure you have permission prior to scanning since it could be perceived as a precursor of an attack.
*NOTE: <IP_Address> represents the IP address from “scanme.org” or an IP address from a device on your network.
- Download the most current version of Nmap from https://nmap.org/download.html.
- Open a command prompt and go to the directory that Nmap was installed.
- Run nmap –h from the command line to see the various options.
- Please notice that Nmap has many different options. Review and find the option for a full connect scan.
Enter the results here: __________.
- Review and find the option for a stealth scan.
Enter the results here: __________.
- Review and find the option for a UDP scan.
Enter the results here: __________.
- Review and find the option for a fingerprint scan.
Enter the results here: __________.
- Perform a full connect scan on one of the local devices you have identified on the private network. The syntax is nmap –sT <IP_Address>
Enter the results here: __________.
- Perform a stealth connect scan on one of the local devices you have identified on the private network. The syntax is nmap –sS <IP_Address>
Enter the results here: __________.
- Perform a full connect scan on one of the local devices you have identified on the private network. The syntax is nmap –sU <IP_Address>
Enter the results here: __________.
- Perform a fingerprint connect scan on one of the local devices you have identified on the private network. The syntax is nmap –O <IP_Address>
Enter the results here: __________.
- Observe the results of each scan. Could Nmap successfully identify the system? Were the ports it identified correct?