You are on page 1of 9

Enrollment No: 200430116515 Subject Name: 3150714 – CS

Batch: B6 Date: 03 / 09 / 2021

Practical 3
AIM: Explore the Nmap tool and list how it can be used for network defence.
Solution:
• Basics of Nmap:
Nmap (Network Mapper) is a free and open-source network scanner created by
Gordon Lyon (also known by his pseudonym Fyodor Vaskovich). o Nmap is used
to discover hosts and services on a computer network by sending packets and
analyzing the responses. o Nmap provides a number of features for probing
computer networks, including host discovery and service and operating system
detection. These features are extensible by scripts that provide more advanced
service detection, vulnerability detection, and other features. Nmap can adapt to
network conditions including latency and congestion during a scan.
o Nmap started as a Linux utility and was ported to other systems
including Windows, macOS, and BSD.
o It is most popular on Linux, followed by Windows.
• Features
o Host discovery – Identifying hosts on a network. For example, listing
the hosts that respond to TCP and/or ICMP requests or have a particular
port open.
o Port scanning – Enumerating the open ports on target hosts.
o Version detection – Interrogating network services on remote devices
to determine application name and version number.
o OS detection – Determining the operating system and hardware
characteristics of network devices.

Shantilal Shah Engineering College, Bhavnagar Page 1 of 9


Enrollment No: 200430116515 Subject Name: 3150714 – CS
Batch: B6 Date: 03 / 09 / 2021

o Scriptable interaction with the target – using Nmap Scripting Engine


(NSE) and Lua programming language. o Nmap can provide further
information on targets, including reverse DNS names, device types, and
MAC addresses.
o Typical uses of Nmap:
 Auditing the security of a device or firewall by identifying the
network connections which can be made to, or through it.
 Identifying open ports on a target host in preparation for auditing.
 Network inventory, network mapping, maintenance and asset
management.
 Auditing the security of a network by identifying new servers.
 Generating traffic to hosts on a network, response analysis and
response time measurement.
 Finding and exploiting vulnerabilities in a network.
 DNS queries and subdomain search
• Working
o Here, I have created an ftp server on my mobile phone and I have used
IP address of that server as a target. ▪ Intense Scan
▪ Command: nmap -T4 -A -v [target]

Shantilal Shah Engineering College, Bhavnagar Page 2 of 9


Enrollment No: 200430116515 Subject Name: 3150714 – CS
Batch: B6 Date: 03 / 09 / 2021

Shantilal Shah Engineering College, Bhavnagar Page 3 of 9


Enrollment No: 200430116515 Subject Name: 3150714 – CS
Batch: B6 Date: 17 / 09 / 2021

Shantilal Shah Engineering College, Bhavnagar Page 4 of 9


Enrollment No: 200430116515 Subject Name: 3150714 – CS
Batch: B6 Date: 17 / 09 / 2021

Shantilal Shah Engineering College, Bhavnagar Page 5 of 9


Enrollment No: 200430116515 Subject Name: 3150714 – CS
Batch: B6 Date: 17 / 09 / 2021

2. Ping scan
 Command: nmap -sn 192.168.43.21

Shantilal Shah Engineering College, Bhavnagar Page 6 of 9


Enrollment No: 200430116515 Subject Name: 3150714 – CS
Batch: B6 Date: 17 / 09 / 2021

3. Quick scan
 Command: nmap -T4 -F 192.168.43.21

Shantilal Shah Engineering College, Bhavnagar Page 7 of 9


Enrollment No: 200430116515 Subject Name: 3150714 – CS
Batch: B6 Date: 17 / 09 / 2021

4. Quick traceroute
 Command: nmap -sn --traceroute 192.168.43.21

Shantilal Shah Engineering College, Bhavnagar Page 8 of 9


Enrollment No: 200430116515 Subject Name: 3150714 – CS
Batch: B6 Date: 17 / 09 / 2021

5. Regular scan
 Command: nmap 192.168.43.21

Shantilal Shah Engineering College, Bhavnagar Page 9 of 9

You might also like