Lab - Detecting Threats and Vulnerabilities: Objectives
Lab - Detecting Threats and Vulnerabilities: Objectives
Objectives
Use Nmap, a port scanner and network mapping tool to detect threats and vulnerabilities on a system.
Background / Scenario
Network Mapper, or Nmap, is an open source utility used for network discovery and security auditing.
Administrators also use Nmap for monitoring hosts or managing service upgrade schedules. Nmap
determines what hosts are available on a network, what services are running, what operating systems are
running, and what packet filters or firewalls are running.
Required Resources
PC with Ubuntu 16.0.4 LTS installed in a virtual machine - you can use the VM from labs completed in
chapter 2.
© 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 3
Lab – Detecting Threats and Vulnerabilities
© 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 3
Lab – Detecting Threats and Vulnerabilities
Using the –sV switch with the nmap command performs a version detection which you can use to
research vulnerabilities.
You captured the SSH keys for the host system. The command runs a set of scripts built into Nmap to test
specific vulnerabilities.
References
Nmap: https://nmap.org/
© 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 3