3.enumerating Host, Port, and Service Scanning
3.enumerating Host, Port, and Service Scanning
Theory
1. To see the help/ manual of nmap we can use the command “man nmap” (OS used kali
linux)
2. You will need to run the target machine metasploitable2 and check the ip address of the
machine using the command ifconfig.
3. Using Kali perform port scanning using nmap on the target machine by running the given
command shown below
4. You will be able to identify the operating system and the target machine’s open port
details.
5. View the output file created which stores all the scan results in metasploitable.nmap
6. Using the cat command you can display the contents of the file
B) Enumeration of Hosts
2. Find out all the host services and their ports by using –sV
3. Using Legion we can also perform enumeration and search for open service ports
1. To find out the host IP Address, IPv6 address and Mail Servers
Conclusion
Practical enumeration in cyber security involves systematically scanning and identifying open
ports, vulnerable services, and active hosts within a network. It plays a vital role in
vulnerability assessment, threat detection, and network optimization. Responsible and
ethical enumeration practices are crucial for maintaining strong cyber security defenses in
the face of evolving threats.
Practical No. 04
Aim: Practical on vulnerability scanning and assessment
Vulnerability Assessment and Penetration Testing (VAPT) services help in evaluating the
existing status of the security, identifying exact flaws and advising a remedial action plan to
safeguard the system. Nmap-vulners, vulscan, and vuln are the common and most popular
CVE detection scripts in the Nmap search engine. These scripts allow you to discover
important information about system security flaws.