0% found this document useful (0 votes)
50 views6 pages

Lab 3 Nmap

Uploaded by

imgautam076
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views6 pages

Lab 3 Nmap

Uploaded by

imgautam076
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

1

LAB RECORD
Semester-I

Course – PG Diploma In Cyber Security


Course Code – CYSPGD(102)
Name- Gautam Kumar Rajak
Reg. No – MCVC2400112
Session – 2024 - 2025
2

OPERATING SYSTEM AND SECUIRITY PRACTICAL


COURSE CODE: CYSPGD (102) DATE:

LAB – 02: Nmap Network Scanning

LAB OBJECTIVE –
1. Understand the basics of Nmap and its importance in network scanning.
2. Perform network discovery to identify active hosts and services.
3. Explore various Nmap scanning techniques for vulnerability assessment.

THEORY
• Nmap (Network Mapper) is a free, open-source tool used for network discovery and
security auditing. It can:
• Detect live hosts on a network.
• Identify open ports and associated services.
• Determine operating system details and potential vulnerabilities.
• Support a variety of scanning techniques, including TCP, UDP, SYN, and others.

PROCEDURE:
Task 1: Basic Host Discovery
1. Lunch the terminal on your system.
2. Execute the following command to identify live hosts in a subnet:
3. Observe the output and note the live hosts discovered.
3

Task 2: Port Scanning


1. Identify open ports on a specific target host:
2. Record the open ports and services detected.

Task 3: Service and Version Detection


1. Perform service detection on the target
2. Analyse the services and their versions reported.

Task 4: OS Detection
1. Determine the operating system running on the target machine:
2. Note the operating system information.
4

Task 5: Aggressive Scan


1. Perform an aggressive scan that combines multiple functionalities:
2. Review the comprehensive details of the target, including traceroute and scripts.

Summary of Commands
1. Host Discovery:
nmap -sn 192.168.1.22/24
2. Port Scanning:
nmap -p 1-1000 192.168.1.22
3. Service and Version Detection
nmap -sV 192.168.1.22
4. OS Detection:
nmap -O 192.168.1.22
5. Aggressive Scan:
nmap -A 192.168.1.22
5

Results:
• List the live hosts discovered.
• Record open ports, services, and their versions.
• Note the OS details and any vulnerabilities found.

Precautions:
1. Always ensure you have explicit permission to scan any network or
host.
2. Use a controlled environment like virtual labs or dedicated test
systems.
3. Document findings responsibly and do not share sensitive
information.

Conclusion:
This lab demonstrates the utility of Nmap in network discovery and
security assessment. By performing various scans, users can identify
potential vulnerabilities and secure their systems proactively.
6

Signature Of Faculty –

You might also like