Professional Documents
Culture Documents
1.
2023F-T2 ISN 2003 - Network Security and
Penetration Testing 01 (CSFM Group 1)
Submitted By
Thazni Kassim(C0895117)
1.Nmap
A network's devices and services can be found and analyzed using Nmap. It assists in locating
open ports, gathering data on network hosts, and evaluating their security.
Purpose
• It may utilise Nmap to execute scans using the TCP and the UDP (User Datagram
Protocol) protocols, scan large network IP addresses, and detect open ports.
• "nmap -sS target_ip" is used to scan TCP.
• Use "nmap -sU target_ip" to scan UDP traffic.
• Nmap is a helpful tool for security assessments since it can be used to carry out
vulnerability scans and analyze a network's security posture. It can do a Full echo Scan.
Usage
• Nmap is used by security professionals to do penetration testing, in which they actively
search networks for vulnerabilities that malicious actors may exploit. Nmap may be
used to find the open services and ports that need security hardening.
• Network Troubleshooting: To identify which applications or ports are not responding
as expected in order to diagnose network issues, Nmap is a valuable tool. This helps
identify and address connection problems.
• Network Inventory: By producing an inventory of every device connected to the
network, administrators may use Nmap to keep track of all connected devices, their IP
addresses, and open ports. This is beneficial for resource management on the network.
• Security Audits: Organisations can employ Nmap to perform routine security audits to
ensure that their network is properly secured. By identifying open ports and possible
vulnerabilities, it helps to maintain a solid security posture.
• Network managers may use Nmap's port scanning tools to check if certain services are
available and installed on target hosts. When setting up and managing network services,
it is beneficial.
2.Angry IP Scanner
The Angry IP scanner for Windows, Linux, and Mac is a quick and simple network scanner.
It is very expandable and allows for a huge variety of uses, with the primary goal of helping
network managers. It is a simple and efficient method for locating open ports and active
devices on a network. It is employed as a tool for network wide scanning.
Purpose
• It is utilised for network-wide range scanning.
• This tool's primary use is reconnaissance; however, it is also used to
troubleshoot networks.
Usage
• Port Scanning: The tool may check discovered devices for open ports. This is beneficial
for identifying potential vulnerabilities or open services that may need to be guarded or
closed, which aids in evaluating a network's security.
• Using the network discovery feature of Angry IP Scanner, network administrators and
security specialists may detect devices connected to a network. This is useful for keeping
track of your devices, detecting unauthorised devices, and ensuring that your network is
correctly maintained.