4.5.2.10 Lab Exploring Nmap
4.5.2.10 Lab Exploring Nmap
Topology
Objectives
Part 1: Exploring Nmap
Part 2: Scanning for Open Ports
Background / Scenario
Port scanning is usually part of a reconnaissance attack. There are a variety of port scanning methods that
can be used. W e will explore how to use the Nmap utility. Nmap is a powerful network utility that is used for
network discovery and security auditing.
b. Open a terminal.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8
Lab - Exploring Nmap
What is Nmap?
d. While in the man page, you can use the up and down arrow keys to scroll through the pages. You can
also press the space bar to forward one page at a time.
To search for a specific term or phrase, enter a forward slash (/) or question mark (?) followed by the
term or phrase. The forward slash searches forward through the document, and the question mark
searches backward through the document. The key n moves to the next match.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 8
Lab - Exploring Nmap
Type /example and press Enter. This will search for the word example forward through the man page.
e. In the first instance of example, you see three matches. To move to the next match, press n.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 8
Lab - Exploring Nmap
f. Scroll through the page to learn more about nmap. Type q when finished.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 8
Lab - Exploring Nmap
For each of the open ports, record the software that is providing the services.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 8
Lab - Exploring Nmap
b. To locate other hosts on this LAN, enter nmap -A -T4 network address/prefix. The last octet of the
IP address should be replaced with a zero. For example, in the IP address 192.168.0.11, the .11 is the
last octet. Therefore, the network address is 192.168.0.0. The /24 is called the prefix and is a shorthand
for the netmask 255.255.255.0. If your VM has a different netmask, search the Internet for a “CIDR
conversion table” to find your prefix. For example, 255.255.0.0 would be /16. The network address
192.168.0.0/24 is used in this example
Note: This operation can take some time, especially if you have many devices attached to the network. In
one test environment, the scan took about 4 minutes.
[analyst@secOps ~]$ nmap -A -T4 192.168.0.0/24
From your Nmap results, list the IP addresses of the hosts that are on the same LAN as your VM. List
some of the services that are available on the detected hosts.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 8
Lab - Exploring Nmap
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 8
Lab - Exploring Nmap
Reflection
Nmap is a powerful tool for network exploration and management. How can Nmap help with network security?
How can Nmap be used by a threat actor as a nefarious tool?
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 8