0% found this document useful (0 votes)
30 views6 pages

Network Reconnaissance and Port Scanning Using Nmap

The document details using nmap to perform network reconnaissance and port scanning on a target system. It describes finding the target IP address and then performing various nmap scans including host discovery, TCP and UDP port scans, OS detection, version detection and a comprehensive scan using the -A option.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views6 pages

Network Reconnaissance and Port Scanning Using Nmap

The document details using nmap to perform network reconnaissance and port scanning on a target system. It describes finding the target IP address and then performing various nmap scans including host discovery, TCP and UDP port scans, OS detection, version detection and a comprehensive scan using the -A option.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Project

Network Reconnaissance and Port Scanning using nmap


1. Finding the IP Address of the Target:
 Executing the following command in the terminal: ifconfig.
• Looking for the IP address associated with the network
interface of the Metasploitable2 VM

2. Host Discovery : nmap -sn 172.17.0.1


3. Perform a Basic nmap Host Discovery Scan:
• In the Kali Linux terminal, execute the command nmap –st

• This command will perform a basic host discovery scan on the target IP
address to check if it's up or down.

Perform a nmap TCP Port Scan:

 In the Kali Linux terminal, executing the command

 $ sudo nmap -sT TARGET

 $ sudo nmap -sS TARGET

 This command will perform a TCP port scan on all ports of


the Metasploitable2 VM (172.17.0.1).

4. Perform a nmap UDP Port Scan


 In the Kali Linux terminal, executing the command nmap -sU
172.17.0.1.

 This command will perform a UDP port scan on the


Metasploitable2 VM (172.17.0.1).
5. Perform a nmap OS Detection Scan:
 In the Kali Linux terminal, executing the command nmap -O
172.17.0.1.

 This command will perform an OS detection scan on the


Metasploitable2 VM (172.17.0.1) to determine the operating
system.
6. Perform a nmap Version and Service Scan:
 In the Kali Linux terminal, executing the command nmap -
sV 172.17.0.1.

 This command will perform a version and service scan on


the Metasploitable2 VM (172.17.0.1) to determine the
versions of services running on open ports.
7. Perform a nmap Scan with the -A Option:
 In the Kali Linux terminal, executing the command nmap -A
172.17.0.1.

 This command will perform a comprehensive scan on the


Metasploitable2 VM (172.17.0.1) using the -A option, which
includes OS detection, version detection, script scanning,
and traceroute.

You might also like