module-3
module-3
Scanning
Networks
Lab objectives –
Step 2. Open file explorer , click on documents > tools > module 3 scanning
networks > scanning tools > Nmap >
Step 3. Double click the nmap file and follow the installation process as shown
in the image .
Step 4. Now open the nmap app
Step 5. We have installed the nmap GUI which has better interface with more
features
Step 6. In the command field type nmap -sn -PR scanme.nmap.org
-sn disables port scanning and -PR is arp ping scan.
Nmap will send icmp echo request if the host is active it will return with icmp
echo reply.
Step 3. Double click the tool and follow the installation process as shown in
the images .
Step 9. The result of the scan appears with name of the host and the ip address
of the alive host.
TASK-3 Perform port and service discovery using nmap.
In udp scan nmap sends a udp packet instead of tcp , so there will be no
threeway handshake . if no response from the target means the port is
open if a icmp host unreachable message is received the port is closed.
Step 8. In the zenmap application we have different types of scan
techniques
This result specifies that the number of packets send and received that
the port 80 is open .
Step 4. hping3 -8 0-100 -S 192.168.1.117
--scan specifies the port range to be scan and 0-100 specifies the range
of port and -S is syn scan
LAB -2
Performing OS discovery using Active and
passive banner grabbing.
Windows 95 32 8192
As you can see the result appears that the target operating system is linux
step 4. nmap -A 192.168.1.103
Fragmentation: Breaking packets into smaller fragments to evade detection by IDS, as some
systems may not inspect fragmented packets comprehensively.
Source Port Manipulation: Source port manipulation involves altering the source port
number in outgoing network packets. This technique is employed to bypass firewall
restrictions or intrusion detection systems (IDS) that rely on port-based filtering.
Where -f for fragmentation it splits the packets into tiny smaller packets
to evade detection of firewalls.