Tutorial 3 - Nmap
Tutorial 3 - Nmap
Objective
The objective of this exercise is to introduce you to the features and role of Nmap in auditing systems.
While the Windows NT ported version of Nmap has the same features as the Linux version and is covered
in this exercise, given a choice between the two, the Linux version is the more stable and robust version.
Requirements
Software
Challenge Procedure
The following are the steps you need to perform for this exercise:
4. Perform an OS identification.
4. In the Select Network Component Type screen, select Protocol and click Add.
5. In the Select Network Protocol screen, click the Have Disk button.
6. In the Install from Disk screen, click Browse and navigate to the DRIVERS directory where you
installed NmapNT. The directory should be C:\Program Files\NmapNT\ DRIVERS. There should
also be three subdirectories. Choose the one appropriate for your operating system.
7. In the Select Network Protocol screen, select Packet Capture Driver and click OK.
10. Now, you'll install Nmap for Linux. Download the Nmap RPM (RedHat Program Manager)
from http://www.insecure.org/nmap/nmap_download.html. Use the rpm command to install the nmap
rpm file:
11. Now, perform a simple scan. Use 127.0.0.1 for the IP address for each of the following steps.
Open a command prompt and enter the following command:
nmapnt 127.0.0.1
NOTE
12. Next, check to see if the host is really down as opposed to blocking ping probes using the following
command:
NOTE
The –P0 (the 0is a zero) option tells Nmap to scan the IP address regardless of whether it allows
Internet Control Message Protocol (ICMP) traffic to it.
13. Next, you'll perform a stealth scan. Enter the following command:
NOTE
The –sS option performs a SYN scan instead of the default TCP connect scan.The –p option
specifies the ports to scan.
Challenge Question: What is the difference between a TCP-connect scan and a SYN scan?
NOTE
The –sT option is used for the TCP-connect scan. It is not required because it is considered the
default type of scan.The –O option attempts to perform OS fingerprinting by analyzing the
predictability of the sequence numbers returned from the target device. This option can also add a
considerable amount of time to the scan length. Note that it's not 100% accurate. Use it to get an
idea of the number returned, but don't use it for accuracy.
15. Next, in addition to OS identification, you will perform a service selection scan.
Challenge Question: How accurate is the operating system estimate of the previous step?