Laboratory Activity 5
Laboratory Activity 5
Part 2
Do the text in red and write it on your notebook. Picture your answer and send it to BB
folder.
1. Stealth Scanning:
Use SYN scan to perform a stealthy scan that is less likely to be detected by
firewalls:
nmap -sS <target_ip>
Discuss the advantages and limitations of stealth scanning.
2. UDP Scanning:
Scan for open UDP ports, which are often overlooked but can be critical:
nmap -sU <target_ip>
Analyze the results and compare them with TCP scans.
3. Firewall Evasion and Spoofing:
Use decoys to obfuscate the source of the scan:
nmap -D RND:10 <target_ip>
Discuss the ethical implications and scenarios where this might be useful.
4. Timing and Performance Options:
Adjust the timing of scans to balance speed and stealth:
nmap -T4 <target_ip>
Experiment with different timing templates (T0 to T5) and observe the
impact on scan results.
5. Script Scanning with NSE (Nmap Scripting Engine):
Use Nmap scripts to perform detailed vulnerability assessments:
nmap --script vuln <target_ip>
Explore other useful scripts by listing available scripts:
nmap --script-help
6. IPv6 Scanning:
Scan IPv6 addresses to ensure comprehensive network coverage:
nmap -6 <target_ipv6>
Discuss the differences between IPv4 and IPv6 scanning.
7. Scanning Through Proxies:
Use a proxy to route your scan through another server:
nmap --proxies <proxy_url> <target_ip>
Explain the benefits and potential issues with proxy scanning.
8. Detecting Firewall Rules:
Use Nmap to identify firewall rules and configurations:
nmap --script firewall-bypass <target_ip>
Analyze how firewalls are configured and how they can be bypassed.
9. Customizing Output Formats:
Save scan results in different formats for further analysis:
nmap -oX output.xml <target_ip>
Discuss how to use these formats with other tools for automated analysis.
10. Combining Scans:
Combine multiple scan types for a comprehensive assessment:
nmap -sS -sU -O -A <target_ip>
Review the combined output and discuss the benefits of multi-faceted
scanning.