0% found this document useful (0 votes)
3 views2 pages

Laboratory Activity 5

The document outlines advanced techniques for network scanning using Nmap, including stealth scanning, UDP scanning, and firewall evasion. It emphasizes the importance of understanding the ethical implications and practical applications of these techniques. Additionally, it covers customizing output formats and combining different scan types for comprehensive assessments.

Uploaded by

Ramon Rodelas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views2 pages

Laboratory Activity 5

The document outlines advanced techniques for network scanning using Nmap, including stealth scanning, UDP scanning, and firewall evasion. It emphasizes the importance of understanding the ethical implications and practical applications of these techniques. Additionally, it covers customizing output formats and combining different scan types for comprehensive assessments.

Uploaded by

Ramon Rodelas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Laboratory Activity 5: Network Scanning with Nmap

Part 2
Do the text in red and write it on your notebook. Picture your answer and send it to BB
folder.

Advanced Nmap Techniques

1. Stealth Scanning:
 Use SYN scan to perform a stealthy scan that is less likely to be detected by
firewalls:
nmap -sS <target_ip>
 Discuss the advantages and limitations of stealth scanning.
2. UDP Scanning:
 Scan for open UDP ports, which are often overlooked but can be critical:
nmap -sU <target_ip>
 Analyze the results and compare them with TCP scans.
3. Firewall Evasion and Spoofing:
 Use decoys to obfuscate the source of the scan:
nmap -D RND:10 <target_ip>
 Discuss the ethical implications and scenarios where this might be useful.
4. Timing and Performance Options:
 Adjust the timing of scans to balance speed and stealth:
nmap -T4 <target_ip>
 Experiment with different timing templates (T0 to T5) and observe the
impact on scan results.
5. Script Scanning with NSE (Nmap Scripting Engine):
 Use Nmap scripts to perform detailed vulnerability assessments:
nmap --script vuln <target_ip>
 Explore other useful scripts by listing available scripts:
nmap --script-help
6. IPv6 Scanning:
 Scan IPv6 addresses to ensure comprehensive network coverage:
nmap -6 <target_ipv6>
 Discuss the differences between IPv4 and IPv6 scanning.
7. Scanning Through Proxies:
 Use a proxy to route your scan through another server:
nmap --proxies <proxy_url> <target_ip>
 Explain the benefits and potential issues with proxy scanning.
8. Detecting Firewall Rules:
 Use Nmap to identify firewall rules and configurations:
nmap --script firewall-bypass <target_ip>
 Analyze how firewalls are configured and how they can be bypassed.
9. Customizing Output Formats:
 Save scan results in different formats for further analysis:
nmap -oX output.xml <target_ip>
 Discuss how to use these formats with other tools for automated analysis.
10. Combining Scans:
 Combine multiple scan types for a comprehensive assessment:
nmap -sS -sU -O -A <target_ip>
 Review the combined output and discuss the benefits of multi-faceted
scanning.

You might also like