You are on page 1of 5

R.V.

COLLEGE OF ENGINEERING, BANGALORE 560059


DEPARTMENT OF INFORMATION SCIENCE & ENGINEERING

Title: NMAP port Monitoring

6th Semester
Mini Project for

12IS4C64 INFORMATION SECURITY

Synopsis submitted

By
Sl No

USN

Name

1RV12IS026

Nishanth M S

1RV12IS034

Prateek Mandi

Sign

Title: NMAP port Monitoring

Brief description:
NMAP is a network mapping utility. This is a security scanner originally written
by Gordon Lyon used to discover hosts and services on a computer network, thus creating a
"map" of the network. It provides TCP/IP address, and it will identify any open "doors" or ports
that might be available on that remote TCP/IP device. Some nmap scans can forge your identity
to make it appear that a separate computer is scanning the network, or simulate multiple scanning
decoys on the network. Nmap is available on flavors of UNIX, Linux, Windows, and Apple
Macintosh OS X.

Features:

Flexible: Supports dozens of advanced techniques for mapping out networks filled with
IP filters, firewalls, routers, and other obstacles. This includes many port scanning
mechanisms (both TCP & UDP), OS detection, version detection, ping sweeps.

Powerful: Nmap has been used to scan huge networks of literally hundreds of thousands
of machines.

Portable: Most operating systems are supported, including Linux, Microsoft Windows,
FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and
more.

Easy: While Nmap offers a rich set of advanced features for power users, you can start
out as simply as "nmap -v -A targethost". Both traditional command line and graphical
(GUI) versions are available to suit your preference.

Free: Nmap is an open source software.

How to Download?
1.
2.
3.
4.

Go to from http://nmap.org/download.html.
Select download option in the menu.
Go to Source code distribution, select the OS.
Then download the software from latest release.

Installing the Nmap in windows:


1. Download the .zip binaries from http://nmap.org/download.html.
2. Uncompress the zip file into the directory you want Nmap to reside in. A directory
called nmap-<version> should be created, which includes the Nmap executable and data
files.
3. For improved performance, apply the Nmap Registry changes.
4. Nmap requires the free WinPcap packet capture library.It can be obtained and installed
from http://www.winpcap.org.
5. Due to the way Nmap is compiled, it requires the Microsoft Visual C++ 2010
Redistributable Package of runtime components. Many systems already have this
installed from other packages, else run vcredist_x86.exe from the zip file.
6. Instructions for executing your compiled Nmap are given in the section called Executing
Nmap on Windows.

Executing Nmap on Windows:


1. Make sure the user you are logged in as has administrative privileges on the computer.
2. Open a command/DOS Window, choose Start -> Run and type cmd<enter>.
3. Change to the directory you installed Nmap into. Type the following commands
c:
cd \Program Files (x86) \ Nmap
4. Execute nmap.exe.

Output format:
Nmap provides four possible output formats:

1. Interactive: presented and updated real time when a user runs Nmap from the
command line. Various options can be entered during the scan to facilitate
monitoring.

2. XML: a format that can be further processed by XML tools. It can be converted into
a HTML report using XSLT.

3. Grepable: output that is tailored to line-oriented processing tools such


as grep, sed or awk.

4. Normal: the output as seen while running Nmap from the command line, but saved
to a file.

Uses of NMAP:

Auditing the security of a device or firewall by identifying the network connections


which can be made to, or through it.

Identifying open ports on a target host in preparation for auditing.

Network inventory, network mapping, maintenance and asset management.

Auditing the security of a network by identifying new servers.

Generating traffic to hosts on a network.

Find and exploit vulnerabilities in a network.

Software Requirement:
Operating System: Microsoft Windows XP.
vcredist_x86.exe.
WinPcap packet capture library.

Faculty Remarks

Faculty Signature
1.
2.
HOD

You might also like