Network Reconnaissance and Port Scanning Using Nmap
The document details using nmap to perform network reconnaissance and port scanning on a target system. It describes finding the target IP address and then performing various nmap scans including host discovery, TCP and UDP port scans, OS detection, version detection and a comprehensive scan using the -A option.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
30 views6 pages
Network Reconnaissance and Port Scanning Using Nmap
The document details using nmap to perform network reconnaissance and port scanning on a target system. It describes finding the target IP address and then performing various nmap scans including host discovery, TCP and UDP port scans, OS detection, version detection and a comprehensive scan using the -A option.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6
Project
Network Reconnaissance and Port Scanning using nmap
1. Finding the IP Address of the Target: Executing the following command in the terminal: ifconfig. • Looking for the IP address associated with the network interface of the Metasploitable2 VM
2. Host Discovery : nmap -sn 172.17.0.1
3. Perform a Basic nmap Host Discovery Scan: • In the Kali Linux terminal, execute the command nmap –st
• This command will perform a basic host discovery scan on the target IP address to check if it's up or down.
Perform a nmap TCP Port Scan:
In the Kali Linux terminal, executing the command
$ sudo nmap -sT TARGET
$ sudo nmap -sS TARGET
This command will perform a TCP port scan on all ports of
the Metasploitable2 VM (172.17.0.1).
4. Perform a nmap UDP Port Scan
In the Kali Linux terminal, executing the command nmap -sU 172.17.0.1.
This command will perform a UDP port scan on the
Metasploitable2 VM (172.17.0.1). 5. Perform a nmap OS Detection Scan: In the Kali Linux terminal, executing the command nmap -O 172.17.0.1.
This command will perform an OS detection scan on the
Metasploitable2 VM (172.17.0.1) to determine the operating system. 6. Perform a nmap Version and Service Scan: In the Kali Linux terminal, executing the command nmap - sV 172.17.0.1.
This command will perform a version and service scan on
the Metasploitable2 VM (172.17.0.1) to determine the versions of services running on open ports. 7. Perform a nmap Scan with the -A Option: In the Kali Linux terminal, executing the command nmap -A 172.17.0.1.
This command will perform a comprehensive scan on the
Metasploitable2 VM (172.17.0.1) using the -A option, which includes OS detection, version detection, script scanning, and traceroute.