Internet Lab #3


Lab 3: Port Scanning with Nmap
Nmap ("Network Mapper") is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free software, available with full source code under the terms of the GNU GPL. Boot Windows 98 (we need Administrator access to install software.) Open Internet Explorer. Download the following files from the Lab #3 web site. You can also download unzip.exe from there, and extract the files from a command prompt. WinPcap_3_1_beta4.exe Latest Nmap release for Windows Pcap packet capture library for Windows

Remember in which folder you have downloaded the files. Install Pcap first by running the .exe file. Follow the instructions on screen to do this. Open an MS-DOS Window. Change (cd) to the folder where you downloaded the files earlier. Unzip the .zip file; an nmap-3.75 folder will be created. Using Internet Explorer again, go to the main Nmap web site and browse through the documentation: Cd to the nmap-3.75 folder, and run nmap -h. This will display the command-line help screen for Nmap, which will likely scroll off your screen. To capture this output, redirect the help to a file, and then load the captured output in Windows Notepad: nmap -h > nmaphelp.txt start notepad nmaphelp.txt
D:\2004F\cnet9562\labs\lab3\lab3.wpd Page 1 of 2

txt scan3. Then you can use Notepad to view the If a scan produces more than 25 lines of output.1 192.txt. 3.28 the L-17 default gateway the primary L-17 DNS server the secondary L-17 DNS server 1.niagarac. Compare the results. uninstall the Pcap www. Find the IP address.on. domain (please be careful and polite!): lundy. 11.on. then run Nmap using that IP address.2.txt and scan3. 4.168.CNET9562 Internet Lab #3 2004F Try the following port scan operations: nmap nmap nmap -P0 -P0 -P0 -v -v -v -sS -sV -O technology. Try similar port scans on other hosts. Boot another PC (say.txt. 10.168. you can capture it to a technology.niagarac.on. 12. into Windows 2000) in the lab.2 network: Other hosts in the niagarac. Try booting the same PC using a different operating system and repeat the port scan. 13. Note: you cannot scan yourself using Windows. delete the Nmap software.niagarac.niagarac.niagarac.on.93.2. When you are done.wpd Page 2 of 2 . 2. D:\2004F\cnet9562\labs\lab3\lab3.txt peoplesoft. and delete the files that you have created or downloaded. For example.on.on. 19.. Try some of the hosts and IP addresses available on your local network: 192. my. Other live hosts in the 192.168. stored in the files email.on.niagarac. nmap nmap nmap -oN -oN -oN scan1.niagarac.10 smtp. 7.txt -P0 -P0 -P0 -v -v -v -sS -sV -O blackboard.niagarac.

Sign up to vote on this title
UsefulNot useful

Master Your Semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master Your Semester with a Special Offer from Scribd & The New York Times

Cancel anytime.