You are on page 1of 12

NAME :- VINEET CHOUDHARY

REGISTRATION NO. :- 19BIT0280

SUBJECT :- ISAA (LAB)

SLOT :- L11+L12

DATE OF SUBMISSION :- 14/10/2021

TOPIC :- LAB ASSESSMENT - 4

SUBMITTED TO :- JEYANTHI N
Basic:
-sn

Disable port scanning. Host discovery only.

-PO

Leaving off end port in range makes the scan go through to port 65535

-PS

TCP SYN discovery on port x. Port 80 by default

-PU

UDP discovery on port x. Port 40125 by default

-sO

Disable port scanning. Host discovery only

-sV

Attempts to determine the version of the service running on port

-O

Remote OS detection using TCP/IP stack fingerprinting


Using n-map to conduct a reconnaissance of your network

1. Use a broad ping scan to determine the hosts that are "up" on a portion of your network.

Enter the following scans & record the results


o n-map -n -sn 10.27.x.0/24

O n-map -n -sn 10.27.0.0/24


a. )Why is the -n option used? What happens if you rerun this command without the -
n option? (Try it) .

Time elapsed is 5.94 s which is more because of the DNS resolution is also done

b.)What does the /24 represent?

Answer :- Represents the number of bits that is contained in the network and is vital information
for network engineers to calculate addresses.

2. Conduct an IP protocol ping (switch -PO / -PS / -PU) on the Common Network hosts.

a.)How many TCP ports are open on each?


b)Are
there any UDP ports open on any machine?
Answer : No None

3. Conduct an IP protocol ping on yourself.

a. How many ports are open?

b. )Are the results different than that attained with the IP protocol ping? Explain.
Answer : Yes they are very different because the hosts are different.

[Hint: read the OS Detection section of the man pages and again note that you will need to
use sudo to have sufficient privilege.]

a.) What operating system does n-map think your Server VM is running?
4. ) Type the following commands in zen-map. Use different IP address and
generatea report.Take a screen shot and write your comments on each command.

a) Scan a Host to Detect Firewall : n-amp –sA 192.168.0.64

b) scan a host if it is protected by any packet filtering software or Firewalls : n-map –PN 192.168.0.101
c) Complete a scan in Stealth Mode : n-map -sS 192.168.0.64

d) Identify Host Names : n-map -sL 192.168.0.1


e) Scan IPv6 Addresses : n-map -6 ::ffff:c0a8:1

f) Create Decoys while scanning : n-map -D 192.168.0.1,192.168.0.2,…


g) Scan remote Hosts using SCTP : n-map -sZ --top-ports 20 -T4 192.168.1.1/24

h) Scan output in xml format : n-map -oX scan-report.xml -n 192.168.1.1


i) Save n-map outputs : n-map -n 192.168.1.1 > scan-report

j) Using multiple script categories : n-map --script discovery,brute 192.168.1.1

You might also like