4.5.2.10 Lab - Exploring Nmap
4.5.2.10 Lab - Exploring Nmap
• Topology
• Objectives
Part 1: Exploring Nmap
Part 2: Scanning for Open Ports
• Background / Scenario
Port scanning is usually part of a reconnaissance attack. There are a variety of port scanning
methods that can be used. We will explore how to use the Nmap utility. Nmap is a powerful network
utility that is used for network discovery and security auditing.
• Required Resources
• CyberOps Workstation Virtual Machine
• Internet access
1. Exploring Nmap
In this part, you will use manual pages (or man pages for short) to learn more about Nmap.
The man [ program |utility | function] command displays the manual pages associated with the
arguments. The manual pages are the reference manuals found on Unix and Linux OSs. These
pages can include these sections: Name, Synopsis, Descriptions, Examples, and See Also.
a. Start CyberOps Workstation VM.
b. Open a terminal.
c. At the terminal prompt, enter man nmap.
[analyst@secOps ~]$ man nmap
What is Nmap?
_____nmap merupkan sebuah tool untuk mengexploritasi tool / port
scanner_______________________________________________________________________
________
What is nmap used for?
_____________________________________________________________________________
_______
_____________________________________________________________________________
_______
_____________________________________________________________________________
_______
_____________________________________________________________________________
_______
a. While in the man page, you can use the up and down arrow keys to scroll through the pages. You
can also press the space bar to forward one page at a time.
To search for a specific term or phrase use enter a forward slash (/) or question mark (?) followed
by the term or phrase. The forward slash searches forward through the document, and the
question mark searches backward through the document. The key n moves to the next match.
Type /example and press ENTER. This will search for the word example forward through the
man page.
a. In the first instance of example, you see three matches. To move to the next match, press n.
• Reflection
Nmap is a powerful tool for network exploration and management. How can Nmap help with network
security? How can Nmap be used by a threat actor as a nefarious tool?
Nmap bisa di gunakn untuk scan sebuah jaringan internal untuk spesifik & identifikasi secara lebih
spesifik open
portnya__________________________________________________________________________
_____________
________________________________________________________________________________
_______
________________________________________________________________________________
_______
________________________________________________________________________________
_______